cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-6553,https://securityvulnerability.io/vulnerability/CVE-2019-6553,Stack-based Buffer Overflow in RSLinx Classic by Rockwell Automation,"An input validation flaw in a .dll file of RSLinx Classic allows attackers to exploit a stack-based buffer overflow by sending a malformed Forward Open service request. This vulnerability can potentially allow an unauthorized entity to execute arbitrary code, posing significant security risks to industrial control systems.",Rockwell Automation,Rslinx Classic,9.8,CRITICAL,0.055810000747442245,false,,false,false,false,,,false,false,,2019-04-04T18:59:09.000Z,0 CVE-2018-14821,https://securityvulnerability.io/vulnerability/CVE-2018-14821,,"Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.",Rockwell Automation,Rslinx Classic,7.5,HIGH,0.013369999825954437,false,,false,false,false,,,false,false,,2018-09-20T00:00:00.000Z,0 CVE-2018-14829,https://securityvulnerability.io/vulnerability/CVE-2018-14829,,"Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.",Rockwell Automation,Rslinx Classic,9.8,CRITICAL,0.10988999903202057,false,,false,false,false,,,false,false,,2018-09-20T00:00:00.000Z,0 CVE-2018-14827,https://securityvulnerability.io/vulnerability/CVE-2018-14827,,"Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.",Rockwell Automation,Rslinx Classic,7.5,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2018-09-20T00:00:00.000Z,0