Page 131 of 763 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A Missing Authentication for Critical Function issue was discovered in Schneider Electric InduSoft Web Studio v8.0 SP2 or prior, and InTouch Machine Edition v8.0 SP2 or prior. InduSoft Web Studio provides the capability for an HMI client to trigger script execution on the server for the purposes of performing customized calculations or actions. A remote malicious entity could bypass the server authentication and trigger the execution of an arbitrary command. The command is executed under high privileges and could lead to a complete compromise of the server. Se descubrió un problema de ausencia de autenticación para una función crítica en Schneider Electric InduSoft Web Studio v8.0 SP2 o anteriores y en InTouch Machine Edition v8.0 SP2 o anteriores. • http://www.securityfocus.com/bid/100952 https://ics-cert.us-cert.gov/advisories/ICSA-17-264-01 • CWE-306: Missing Authentication for Critical Function •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to specify Arbitrary Server Target Nodes in connection requests to the Secure Gateway and Server components. Existe una vulnerabilidad en la versión 1.0 de PowerSCADA Anywhere de Schneider Electric redistribuida con PowerSCADA Expert 8.1, PowerSCADA Expert 8.2 y Citect Anywhere 1.0 que permite que se especifiquen nodos de destino del servidor arbitrarios en peticiones de conexión a los componentes de Secure Gateway y Server. • http://www.schneider-electric.com/en/download/document/SEVD-2017-173-01 http://www.securityfocus.com/bid/99913 https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9071-security-notification-citect-anywhere •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass Existe una vulnerabilidad de omisión de autenticación en las versiones 1.2.1 y anteriores del software de U.motion Builder de Schneider Electric en la que el sistema contiene una sesión válida embebida. Un atacante podría utilizar ese ID de sesión como parte de la cookie HTTP de una petición web, resultando en una omisión de autenticación. • http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01 http://www.securityfocus.com/bid/99344 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability exists in Schneider Electric's Pro-Face GP Pro EX version 4.07.000 that allows an attacker to execute arbitrary code. Malicious code installation requires an access to the computer. By placing a specific DLL/OCX file, an attacker is able to force the process to load arbitrary DLL and execute arbitrary code in the context of the process. Existe una vulnerabilidad en la versión 4.07.000 de Pro-Face GP Pro EX de Schneider Electric que permite que un atacante ejecute código arbitrario. Se necesita acceder a un ordenador para instalar el código malicioso. • http://www.schneider-electric.com/en/download/document/SEVD-2017-195-01 http://www.securityfocus.com/bid/100114 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system response to error provides more information than should be available to an unauthenticated user. Existe una vulnerabilidad de divulgación de información en las versiones 1.2.1 y anteriores del software de U.motion Builder de Schneider Electric en la que los mensajes de error del sistema proporcionan más información de la que se debería mostrar a un usuario no autenticado. • http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01 http://www.securityfocus.com/bid/99344 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •