Page 139 of 763 results (0.012 seconds)

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 1

An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved. Ha sido descubierto un problema en los medidores de potencia de las series IONXXXX, ION73XX, ION75XX, ION76XX, ION8650, ION8800 y PM5XXX de Schneider Electric. No hay Token CSRF generado para autenticar al usuario durante una sesión. • https://www.exploit-db.com/exploits/44640 http://www.securityfocus.com/bid/92916 https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Schneider Electric Wonderware Historian 2014 R2 SP1 P01 and earlier. Wonderware Historian creates logins with default passwords, which can allow a malicious entity to compromise Historian databases. In some installation scenarios, resources beyond those created by Wonderware Historian may be compromised as well. Ha sido descubierto un problema en Schneider Electric Wonderware Historian 2014 R2 SP1 P01 y versiones anteriores. Wonderware Historian crea inicios de sesión con contraseñas predeterminadas, lo que puede permitir que una entidad maliciosa comprometer las bases de datos de Historian. • http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000115 http://www.securityfocus.com/bid/95766 http://www.securitytracker.com/id/1037808 https://ics-cert.us-cert.gov/advisories/ICSA-17-024-01 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions. Ha sido descubierto un problema en Schneider Electric Unity PRO en versiones anteriores a V11.1. • http://www.securityfocus.com/bid/93830 https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 21%CPEs: 3EXPL: 0

An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. Un control ActiveX no especificado en Schneider Electric SoMachine HVAC Programming Software para M171/M172 Controllers en versiones anteriores a 2.1.0 permite a atacantes remotos ejecutar código arbitrario a través de vectores desconocidos, relacionados con el indicador INTERFACESAFE_FOR_UNTRUSTED_CALLER (también conocido como secuencias de comandos para guardar). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric SoMachine HVAC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the SetDataIntf method of the AxEditGrid control. The control has an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-161-01 http://www.securityfocus.com/bid/91778 http://www.zerodayinitiative.com/advisories/ZDI-16-440 https://ics-cert.us-cert.gov/advisories/ICSA-16-196-03 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Schneider Electric Pelco Digital Sentry Video Management System with firmware before 7.14 has hardcoded credentials, which allows remote attackers to obtain access, and consequently execute arbitrary code, via unspecified vectors. Schneider Electric Pelco Digital Sentry Video Management System con firmware en versiones anteriores a 7.14 tiene credenciales embebidas, lo que permite a atacantes remotos obtener acceso y consecuentemente ejecutar código arbitrario, a través de vectores no especificados. • http://www.schneider-electric.com/ww/en/download/document/SEVD-2016-153-01 http://www.securityfocus.com/bid/91783 https://ics-cert.us-cert.gov/advisories/ICSA-16-196-01 •