7 results (0.002 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Invensys Wonderware InTouch HMI 2012 R2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Invensys Wonderware InTouch HMI 2012 R2 y anteriores permite a atacantes remotos leer archivos de forma arbitraria, enviar peticiones HTTP a servidores de intranet o causar una denegación de servicio (consumo de memoria y CPU) a través de un documento XML que contienen declaraciones de entidad externas en conjunto con una referencia a entidad, relacionado con el problema XML External Entity (XXE) • http://ics-cert.us-cert.gov/advisories/ICSA-13-276-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file. nvensys Wonderware InTouch R2 2012 y anteriores y ProcessSuite Siemens utilizan un algoritmo de cifrado débil para los datos en Ps_security.ini, lo que hace que sea más fácil para los usuarios locales descubrir contraseñas mediante la lectura de este archivo. • http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-370812.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-348-01.pdf • CWE-310: Cryptographic Issues •

CVSS: 6.9EPSS: 0%CPEs: 14EXPL: 0

Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. Una vulnerabilidad de ruta de búsqueda no confiable en Invensys Wonderware InTouch 2012 y anteriores, tal como se utiliza en el servidor de aplicaciones Wonderware, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch y Wonderware Historian, permite a usuarios locales conseguir privilegios a través de un DLL troyano en un directorio no especificado. • http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Stack-based buffer overflow in slssvc.exe before 58.x in Invensys Wonderware SuiteLink in the Invensys System Platform software suite, as used in InTouch/Wonderware Application Server IT before 10.5 and WAS before 3.5, DASABCIP before 4.1 SP2, DASSiDirect before 3.0, DAServer Runtime Components before 3.0 SP2, and other products, allows remote attackers to cause a denial of service (daemon crash or hang) via a long Unicode string. Desbordamiento de buffer basado en pila en slssvc.exe antes de v58.x en Invensys Wonderware SuiteLink en el Invensys System Platform software suite, como se usa en InTouch/Wonderware Application Server IT antes de v10.5 y WAS before v3.5, DASABCIP antes de v4.1 SP2, DASSiDirect antes de v3.0, DAServer Runtime Components antes de v3.0 SP2, y otros productos, permite a atacantes remotos causar una denegación de servicio (caída del demonio o bloqueo) a través de una larga cadena Unicode. • http://secunia.com/advisories/49173 http://www.securityfocus.com/bid/53563 http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007. slssvc.exe en Invensys Wonderware SuiteLink en Invensys InTouch 2012 y Wonderware Application Server 2012, permite a atacantes remotos causar una denegación de servicio (consumo de recursos) a través de una larga cadena Unicode, una vulnerabilidad diferente a CVE-2012-3007. • http://secunia.com/advisories/49173 http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf • CWE-399: Resource Management Errors •