An authenticated user might execute malicious code under the user context and take control of the system. S+ Operations or S+ Historian database is affected by multiple vulnerabilities such as the possibility to allow remote authenticated users to gain high privileges.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Symphony_+_historian | Abb | 3.0 (including) | 3.0 (including) |
Symphony_+_historian | Abb | 3.1 (including) | 3.1 (including) |
Symphony_+_operations | Abb | 1.1 (including) | 1.1 (including) |
Symphony_+_operations | Abb | 2.0 (including) | 2.0 (including) |
Symphony_+_operations | Abb | 2.1-sp1 (including) | 2.1-sp1 (including) |
Symphony_+_operations | Abb | 2.1-sp2 (including) | 2.1-sp2 (including) |
Symphony_+_operations | Abb | 3.0 (including) | 3.0 (including) |
Symphony_+_operations | Abb | 3.1 (including) | 3.1 (including) |
Symphony_+_operations | Abb | 3.2 (including) | 3.2 (including) |
Symphony_+_operations | Abb | 3.3 (including) | 3.3 (including) |