7 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-03 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Reflected cross-site scripting (non-persistent) in SCADA WebServer (Versions prior to 2.03.0001) could allow an attacker to send a crafted URL that contains JavaScript, which can be reflected off the web application to the victim's browser. Cross-Site Scripting (XSS) reflejado (no persistente) en SCADA WebServer (versiones anteriores a la 2.03.0001) podría permitir que un atacante envíe una URL manipulada que contiene JavaScript, que puede reflejarse desde la aplicación web hasta el navegador de la víctima. • http://www.securityfocus.com/bid/106105 https://ics-cert.us-cert.gov/advisories/ICSA-18-338-02 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

In SpiderControl MicroBrowser Windows XP, Vista 7, 8 and 10, Versions 1.6.30.144 and prior, an uncontrolled search path element vulnerability has been identified which could be exploited by placing a specially crafted DLL file in the search path. If the malicious DLL is loaded prior to the valid DLL, an attacker could execute arbitrary code on the system. En SpiderControl MicroBrowser en Windows XP, Vista 7, 8 y 10, en sus versiones 1.6.30.144 y anteriores, se ha identificado una vulnerabilidad no controlada del elemento de ruta de búsqueda que podría explotarse colocando un archivo DLL especialmente manipulado en la ruta de búsqueda. Si el DLL malicioso se carga antes que el DLL válido, un atacante podría ejecutar código arbitrario en el sistema. • http://spidercontrol.net/download/downloadarea/?lang=en http://www.securityfocus.com/bid/101505 https://ics-cert.us-cert.gov/advisories/ICSA-17-292-01 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An Improper Privilege Management issue was discovered in SpiderControl SCADA Web Server Version 2.02.0007 and prior. Authenticated, non-administrative local users are able to alter service executables with escalated privileges, which could allow an attacker to execute arbitrary code under the context of the current system services. Se ha descubierto un problema de gestión incorrecta de privilegios en SpiderControl SCADA Web Server en versiones 2.02.0007 y anteriores. Los usuarios locales autenticados y no administradores pueden alterar los ejecutables del servicio con sus privilegios escalados, lo que podría permitir que un atacante ejecute código arbitrario en el contexto de los servicios del sistema actuales. SpiderControl SCADA Web Server versions 2.02.0007 and below suffer from an improper privilege management vulnerability. • http://www.securityfocus.com/bid/100668 https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01 • CWE-269: Improper Privilege Management •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

An Improper Authentication issue was discovered in iniNet Solutions iniNet Webserver, all versions prior to V2.02.0100. The webserver does not properly authenticate users, which may allow a malicious attacker to access sensitive information such as HMI pages or modify PLC variables. Se ha descubierto un problema de autenticación incorrecta en iniNet Solutions iniNet Webserver en todas las versiones anteriores a la V2.02.0111. El servidor web no autentica correctamente a los usuarios, lo que podría permitir que un atacante malicioso acceda a información sensible como las páginas HMI o que modifiquen variables PLC. • http://www.securityfocus.com/bid/100951 https://ics-cert.us-cert.gov/advisories/ICSA-17-264-04 • CWE-287: Improper Authentication •