Ptc Opc Aggregator
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Ptc Opc Aggregator.
By the Year
In 2026 there have been 0 vulnerabilities in Ptc Opc Aggregator. Opc Aggregator did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 4 | 8.88 |
It may take a day or so for new Opc Aggregator vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Ptc Opc Aggregator Security Vulnerabilities
KEPServerEX Unvalidated Client Certs Enable Unauth Connections
CVE-2023-5909
7.5 - High
- November 30, 2023
KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.
Improper Certificate Validation
KEPServerEX Buffer Overflow Enables Crash / Info Leak
CVE-2023-5908
9.1 - Critical
- November 30, 2023
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
Classic Buffer Overflow
RCE in Kepware KEPServerEX 6.11.718.0 via Encoding Buffer Overflow
CVE-2022-2848
9.1 - Critical
- March 29, 2023
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.
Heap-based Buffer Overflow
Remote Code Exec via Stack Buffer Overflow in Kepware KEPServerEX 6.11
CVE-2022-2825
9.8 - Critical
- March 29, 2023
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.
Stack Overflow
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Ptc Opc Aggregator or by Ptc? Click the Watch button to subscribe.