Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22711

EPSS 0.13% · P31
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-22711

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could result in arbitrary read or write conditions when malicious CGF (Configuration Group File) file is imported to IGSS Definition due to missing validation of input data.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
内存缓冲区边界内操作的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Schneider Electric Interactive Graphical SCADA System 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Schneider Electric Interactive Graphical SCADA System(IGSS)是法国施耐德电气(Schneider Electric)公司的一套用于监控和控制工业过程的SCADA(数据采集与监控系统)系统。 Interactive Graphical SCADA System 存在安全漏洞,该漏洞源于缺少验证输入数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior -

II. Public POCs for CVE-2021-22711

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-22711

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-03-11 · 29 CVEs total

CVE-2020-29045WordPress 代码问题漏洞
CVE-2021-27919Google Golang 安全漏洞
CVE-2021-28134Akash Rajpurohit clipper 安全漏洞
CVE-2021-28132LUCY Security Awareness Software 操作系统命令注入漏洞
CVE-2021-28144D-Link DIR-3060 命令注入漏洞
CVE-2021-26776CSZ CMS 跨站脚本漏洞
CVE-2021-27677Batflat CMS 跨站脚本漏洞
CVE-2021-27678Pawe? Klockiewicz Batflat CMS 跨站脚本漏洞
CVE-2021-27679Pawe? Klockiewicz Batflat CMS 跨站脚本漏洞
CVE-2021-28088ImpressCMS 跨站脚本漏洞
CVE-2021-28141Progress Telerik UI for ASP.NET AJAX 安全漏洞
CVE-2020-14987Bloomreach Experience Manager 安全漏洞
CVE-2020-14988Bloomreach Experience Manager 跨站脚本漏洞
CVE-2020-14989Bloomreach Experience Manager 跨站请求伪造漏洞
CVE-2020-36278Dan Bloomberg Leptonica 缓冲区错误漏洞
CVE-2021-20261Linux kernel 竞争条件问题漏洞
CVE-2021-22714Schneider Electric PowerLogic 缓冲区错误漏洞
CVE-2021-22713Schneider Electric PowerLogic 缓冲区错误漏洞
CVE-2020-36277Dan Bloomberg Leptonica 安全漏洞
CVE-2021-22712Schneider Electric Interactive Graphical SCADA System 缓冲区错误漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-22711

No comments yet


Leave a comment