cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-1118,https://securityvulnerability.io/vulnerability/CVE-2022-1118,Rockwell Automation ISaGRAF Deserialization of Untrusted Data,"Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited",Rockwell Automation,"Connected Component Workbench,Isagraf Workbench,Safety Instrumented Systems Workstation",8.6,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2022-05-17T19:47:10.000Z,0 CVE-2022-1018,https://securityvulnerability.io/vulnerability/CVE-2022-1018,ICSA-22-088-01 Rockwell Automation ISaGRAF,"When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality.",Rockwell Automation,"Connected Component Workbench,Isagraf,Safety Instrumented Systems Workstation",5.5,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2022-04-01T23:15:00.000Z,0 CVE-2021-27475,https://securityvulnerability.io/vulnerability/CVE-2021-27475,Rockwell Automation Connected Components Workbench Deserialization of Untrusted Data,"Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.",Rockwell Automation,Connected Components Workbench,8.6,HIGH,0.0213600005954504,false,,false,false,false,,,false,false,,2022-03-23T19:46:38.000Z,0 CVE-2021-27471,https://securityvulnerability.io/vulnerability/CVE-2021-27471,Rockwell Automation Connected Components Workbench Path Traversal,"The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful.",Rockwell Automation,Connected Components Workbench,7.7,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2022-03-23T19:46:37.000Z,0 CVE-2021-27473,https://securityvulnerability.io/vulnerability/CVE-2021-27473,Rockwell Automation Connected Components Workbench Improper Input Validation,"Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.",Rockwell Automation,Connected Components Workbench,6.1,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2022-03-23T19:46:36.000Z,0