Filtered by vendor Openautomationsoftware Subscriptions
Filtered by product Open Automation Software Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-22178 1 Openautomationsoftware 2 Oas Platform, Open Automation Software 2025-01-23 4.9 Medium
A file write vulnerability exists in the OAS Engine Save Security Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2024-27201 1 Openautomationsoftware 1 Open Automation Software 2025-01-23 4.9 Medium
An improper input validation vulnerability exists in the OAS Engine User Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2024-21870 1 Openautomationsoftware 1 Open Automation Software 2025-01-23 4.9 Medium
A file write vulnerability exists in the OAS Engine Tags Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2024-24976 1 Openautomationsoftware 1 Open Automation Software 2025-01-23 4.9 Medium
A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2024-11220 1 Openautomationsoftware 2 Oas Platform, Open Automation Software 2025-01-23 7.8 High
A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.