6 results (0.012 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

A CWE-125:Out-of-Bounds Read vulnerability exists that could cause unintended data disclosure when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior Una CWE-125: Se presenta una vulnerabilidad de Lectura Fuera De Límites que podría causar una divulgación involuntaria de datos cuando es cargado un archivo de configuración *.gd1 malicioso en la herramienta GUIcon. Producto afectado: Eurotherm by Schneider Electric GUIcon Versión 2.0 (Build 683.003) y anteriores • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-07 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior Una CWE-416: Se presenta una vulnerabilidad de Uso de Memoria previamente Liberada que podría causar una ejecución de código arbitrario cuando es cargado un archivo de configuración *.gd1 malicioso en la herramienta GUIcon. Producto afectado: Eurotherm by Schneider Electric GUIcon Versión 2.0 (Build 683.003) y anteriores • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-07 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A CWE-787: Out-of-bounds Write vulnerability exists that could cause arbitrary code execution when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior Una CWE-787: Se presenta una vulnerabilidad de escritura fuera de límites que podría causar una ejecución de código arbitrario cuando es cargado un archivo de configuración *.gd1 malicioso en la herramienta GUIcon. Producto afectado: Eurotherm by Schneider Electric GUIcon Versión 2.0 (Build 683.003) y anteriores • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-07 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) on pcwin.dll which could cause remote code to be executed when parsing a GD1 file Existe una vulnerabilidad de confusión de tipos (CWE-843) en Eurotherm, de Schneider Electric GUIcon V2.0 (Gold Build 683.0), en pcwin.dll, lo que podría provocar que se ejecute código remoto al analizar un archivo GD1. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric GUIcon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GD1 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • http://www.securityfocus.com/bid/106218 https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01 • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A Stack-based Buffer Overflow (CWE-121) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) which could cause remote code to be executed when parsing a GD1 file Existe una vulnerabilidad de desbordamiento de búfer basado en pila (CWE-121) en Eurotherm, de Schneider Electric GUIcon V2.0 (Gold Build 683.0), lo que podría provocar que se ejecute código remoto al analizar un archivo GD1. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric GUIcon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within parsing of a GD1 file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the process. • http://www.securityfocus.com/bid/106218 https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01 • CWE-787: Out-of-bounds Write •