Page 18 of 91 results (0.009 seconds)

CVSS: 7.8EPSS: 33%CPEs: 1EXPL: 0

Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list arbitrary virtual-directory files via unspecified vectors. Vulnerabilidad de salto de directorio en Advantech WebAccess en versiones anteriores a 8.1 permite a atacantes remotos listar archivos virtuales del directorio virtual a través de vectores no especificados. This vulnerability allows remote attackers to disclose arbitrary file contents on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebAccess Dashboard Viewer. Insufficient validation within the openWidget script allows unauthenticated callers to read the content of arbitrary files on the WebAccess server. • http://www.zerodayinitiative.com/advisories/ZDI-16-122 http://www.zerodayinitiative.com/advisories/ZDI-16-123 http://www.zerodayinitiative.com/advisories/ZDI-16-124 http://www.zerodayinitiative.com/advisories/ZDI-16-125 http://www.zerodayinitiative.com/advisories/ZDI-16-126 https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Advantech WebAccess before 8.1 allows remote attackers to read sensitive cleartext information about e-mail project accounts via unspecified vectors. Advantech WebAccess en versiones anteriores a 8.1 permite a atacantes remotos leer información sensible en texto plano sobre cuentas de proyecto de correos electrónicos a través de vectores no especificados. • https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.9EPSS: 5%CPEs: 1EXPL: 0

Multiple stack-based buffer overflows in an unspecified DLL file in Advantech WebAccess before 8.0_20150816 allow remote attackers to execute arbitrary code via a crafted file that triggers long string arguments to functions. Desbordamiento de buffer basado en pila múltiple en un archivo DLL no especificado en Advantech WebAccess en versiones anteriores a 8.0_20150816, permite a atacantes remotos ejecutar código arbitrario a través de un archivo manipulado que desencadena argumentos de cadena largos en funciones. • https://ics-cert.us-cert.gov/advisories/ICSA-15-258-04 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 29%CPEs: 1EXPL: 1

Multiple stack-based buffer overflows in unspecified DLL files in Advantech WebAccess before 8.0.1 allow remote attackers to execute arbitrary code via unknown vectors. Múltiple desbordamiento de buffer basado en pila en archivos DLL no especificados en Advantech WebAccess en versiones anteriores a 8.0.1, permite a atacantes remotos ejecutar código arbitrario a través de vectores desconocidos. Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. • https://www.exploit-db.com/exploits/38108 https://ics-cert.us-cert.gov/advisories/ICSA-15-251-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 6%CPEs: 1EXPL: 0

Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows remote attackers to execute arbitrary code via a crafted ip_address parameter in an HTML document. Desbordamiento de buffer basado en pila de Advantech WebAccess antiguamente Broadwin WebAccess, anterior a 8.0 permite a atacantes remotos ejecutar código arbitrario a través de un parámetro ip_address manipulado en un documento HMTL. • https://ics-cert.us-cert.gov/advisories/ICSA-14-324-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •