Page 151 of 763 results (0.016 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Multiple buffer overflows in Schneider Electric Modicon Quantum PLC allow remote attackers to cause a denial of service via malformed requests to the (1) FTP server or (2) HTTP server. Múltiples desbordamientos de búfer en los PLCs 'Modicon Quantum' de Schneider Electric permiten a atacantes remotos provocar una denegación de servicio a través de solicitudes mal formadas al (1) servidor FTP o (2) al servidor HTTP. • http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72588 https://exchange.xforce.ibmcloud.com/vulnerabilities/72589 https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 0

Schneider Electric Modicon Quantum PLC does not perform authentication between the Unity software and PLC, which allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors. Schneider Electric Modicon Quantum PLC no autentica la conexión entre el software de la unidad y el PLC, lo que permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección a través de vectores no especificados. • http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72586 https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 • CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Schneider Electric Modicon Quantum PLC allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en PLCs Modicon Quantum de Schneider Electric permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados. • http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72590 https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 4%CPEs: 22EXPL: 0

The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. El módulo Schneider Electric Quantum Ethernet, tal como se utiliza en los módulos Quantum 140NOE771* y 140CPU65*, los módulos Premium TSXETY* y TSXP57*, los módulos M340 BMXNOE01* y BMXP3420*, y los módulos STB DIO STBNIC2212 y STBNIP2*, utiliza contraseñas estáticas para las cuentas (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, y (16) webserver, lo que facilita a atacantes remotos obtener acceso a través de (a) TELNET, (b) Windriver Debug, o (c) el puerto FTP. • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-018-01.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72587 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

The ComputePassword function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device (aka the Quantum 140NOE771* module) generates the password for the fwupgrade account by performing a calculation on the MAC address, which makes it easier for remote attackers to obtain access via a (1) ARP request message or (2) Neighbor Solicitation message. La función ComputePassword del módulo Schneider Electric Quantum Ethernet del dispositivo NOE 771 (modulo Quantum 140NOE771*) genera la contraseña de la cuenta fwupgrade realizando un cálculo con la dirección MAC, lo que facilita a atacantes remotos obtener acceso a través de (1) un mensaje de petición ARP o (2) un mensaje de descubrimiento de elementos en la misma red ("Neighbor Solicitation"). • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 • CWE-287: Improper Authentication •