Page 16 of 83 results (0.004 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution. En Fuji Electric V-Server en versiones 4.0.3.0 y anteriores, se ha identificado una vulnerabilidad de uso de memoria previamente liberada que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of a VPR file. The issue results from the lack of validating the existence of an object prior to performing operations on the object. • https://ics-cert.us-cert.gov/advisories/ICSA-18-254-01 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

Fuji Electric V-Server 4.0.3.0 and prior, A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution. En Fuji Electric V-Server en versiones 4.0.3.0 y anteriores, se ha identificado una vulnerabilidad de desbordamiento de búfer basado en pila que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of a VPR file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securityfocus.com/bid/105341 https://ics-cert.us-cert.gov/advisories/ICSA-18-254-01 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

Fuji Electric V-Server 4.0.3.0 and prior, An out-of-bounds read vulnerability has been identified, which may allow remote code execution. En Fuji Electric V-Server en versiones 4.0.3.0 y anteriores, se ha identificado una vulnerabilidad de lectura fuera de límites que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of a VPR file. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. • http://www.securityfocus.com/bid/105341 https://ics-cert.us-cert.gov/advisories/ICSA-18-254-01 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

A Stack-based Buffer Overflow issue was discovered in Fuji Electric V-Server VPR 4.0.1.0 and prior. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution. Se ha descubierto un problema de desbordamiento de búfer basado en pila en Fuji Electric V-Server VPR 4.0.1.0 y anteriores. Se ha identificado una vulnerabilidad de desbordamiento de búfer basado en pila, lo que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fuji Electric V-Server. • http://www.securityfocus.com/bid/102903 https://ics-cert.us-cert.gov/advisories/ICSA-18-032-01 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

An Improper Privilege Management issue was discovered in Fuji Electric Monitouch V-SFT versions prior to Version 5.4.43.0. Monitouch V-SFT is installed in a directory with weak access controls by default, which could allow an authenticated attacker with local access to escalate privileges. Se ha descubierto un problema de gestión incorrecta de privilegios en Fuji Electric Monitouch V-SFT en las versiones anteriores a la 5.4.43.0. Monitouch V-SFT se instala en un directorio con controles de acceso por defecto débiles, lo que podría permitir que un atacante autenticado con acceso local escale privilegios. This vulnerability allows local attackers to escalate their privileges on vulnerable installations of Fuji Electric Monitouch V-SFT. • http://www.securityfocus.com/bid/100268 http://www.zerodayinitiative.com/advisories/ZDI-17-646 https://ics-cert.us-cert.gov/advisories/ICSA-17-222-04 • CWE-269: Improper Privilege Management •