Page 2 of 46 results (0.006 seconds)

CVSS: 5.3EPSS: 0%CPEs: 25EXPL: 0

Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore. Una vulnerabilidad de denegación de servicio en el servidor web de Eaton SMP Gateway permite a un atacante forzar potencialmente un reinicio inesperado de la plataforma de automatización, lo que afecta la disponibilidad del producto. En situaciones excepcionales, el problema podría provocar que el dispositivo SMP se reinicie en Modo Seguro o Modo Seguro Máximo. • https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation’s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html . • https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software. Eaton Intelligent Power Protector (IPP) versiones anteriores a 1.69 es vulnerable al Cross Site Scripting almacenado. La vulnerabilidad es presentada debido a una insuficiente comprobación de la entrada del usuario y a una codificación inapropiada de la salida de determinados recursos dentro del software IPP • https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Intelligent-Power-Protector-Vulnerability-Advisory_1001b_V1.0.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to CSV Formula Injection. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions. Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) versión 1.5.0plus205 y todas las versiones anteriores, son vulnerables a una inyección de fórmulas CSV. Este problema afecta: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) toda la versión 1.5.0plus205 y versiones anteriores • https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Intelligent-Power-Manager-%28IPM%29-Infrastructure-Vulnerability-Advisory_1001c_V1.0.pdf https://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-intelligent-power-manager/software/ipm-understand-edition-emea/eaton-ipminfra-eolmemo-en-us.pdf. • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to Stored Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions. Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) versión 1.5.0plus205 y todas las versiones anteriores, son susceptibles a una vulnerabilidad de tipo Cross-Site Scripting Almacenado. Este problema afecta: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) todas las versiones 1.5.0plus205 y versiones anteriores • https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Intelligent-Power-Manager-%28IPM%29-Infrastructure-Vulnerability-Advisory_1001c_V1.0.pdf https://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-intelligent-power-manager/software/ipm-understand-edition-emea/eaton-ipminfra-eolmemo-en-us.pdf. • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •