Vulnerabilities > Selinc

DATE CVE VULNERABILITY TITLE RISK
2023-05-10 CVE-2023-2310 Unspecified vulnerability in Selinc products
A Channel Accessible by Non-Endpoint vulnerability in the Schweitzer Engineering Laboratories SEL Real-Time Automation Controller (RTAC) could allow a remote attacker to perform a man-in-the-middle (MiTM) that could result in denial of service. See the ACSELERATOR RTAC SEL-5033 Software instruction manual date code 20210915 for more details.
network
high complexity
selinc
5.3
2023-05-10 CVE-2023-31148 Improper Input Validation vulnerability in Selinc products
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-20
8.8
2023-05-10 CVE-2023-31149 Improper Input Validation vulnerability in Selinc products
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-20
8.8
2023-05-10 CVE-2023-31150 Insecure Storage of Sensitive Information vulnerability in Selinc products
A Storing Passwords in a Recoverable Format vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) database system could allow an authenticated attacker to retrieve passwords. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-922
6.5
2023-05-10 CVE-2023-31151 Improper Certificate Validation vulnerability in Selinc products
An Improper Certificate Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote unauthenticated attacker to conduct a man-in-the-middle (MitM) attack. See SEL Service Bulletin dated 2022-11-15 for more details.
network
high complexity
selinc CWE-295
4.2
2023-05-10 CVE-2023-31152 Improper Authentication vulnerability in Selinc products
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass.
network
low complexity
selinc CWE-287
8.8
2023-05-10 CVE-2023-31153 Cross-site Scripting vulnerability in Selinc products
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-79
5.4
2023-05-10 CVE-2023-31154 Cross-site Scripting vulnerability in Selinc products
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-79
5.4
2023-05-10 CVE-2023-31155 Cross-site Scripting vulnerability in Selinc products
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-79
5.4
2023-05-10 CVE-2023-31156 Cross-site Scripting vulnerability in Selinc products
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
network
low complexity
selinc CWE-79
5.4