Page 2 of 10 results (0.007 seconds)

CVSS: 6.8EPSS: 4%CPEs: 12EXPL: 0

Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member. Desbordamiento de búfer basado en memoria dinámica en el componente ActiveX WWCabFile en Wonderware System Platform en Invensys Wonderware Application Server 2012 y anteriores, Foxboro Control Software v3.1 y anteriores, InFusion CE/FE/SCADA v2.5 y anteriores, Wonderware Information Server v4.5 y anteriores, ArchestrA Application Object Toolkit v3.2 y anteriores, y InTouch v10.0 hasta v10.5 ,permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga sobre el miembro Addfile. • http://osvdb.org/80891 http://secunia.com/advisories/48675 http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 4%CPEs: 12EXPL: 0

Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite. Desbordamiento de búfer basado en memoria dinámica en el componente ActiveX WWCabFile en Wonderware System Platform en Invensys Wonderware Application Server 2012 y anteriores, Foxboro Control Software v3.1 y anteriores, InFusion CE/FE/SCADA v2.5 y anteriores, Wonderware Information Server v4.5 y anteriores, ArchestrA Application Object Toolkit v3.2 y anteriores, y InTouch v10.0 hasta v10.5 ,permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga sobre el miembro Open, provocando una sobrescritura de un puntero a función. • http://osvdb.org/80891 http://secunia.com/advisories/48675 http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 85%CPEs: 2EXPL: 2

The SuiteLink Service (aka slssvc.exe) in WonderWare SuiteLink before 2.0 Patch 01, as used in WonderWare InTouch 8.0, allows remote attackers to cause a denial of service (NULL pointer dereference and service shutdown) and possibly execute arbitrary code via a large length value in a Registration packet to TCP port 5413, which causes a memory allocation failure. El servicio SuiteLink Service (también conocido como slssvc.exe) en WonderWare SuiteLink anterior a 2.0 Patch 01, como el usado en WonderWare InTouch 8.0, permite a atacantes remotos provocar una denegación de servicio(referencia a puntero nulo y apagado de servicio) y posiblemente ejecutar código de su elección mediante un valor de longitud largo en un paquete Registration (registro) al puerto TCP 5413, que provoca un fallo de asignación de memoria. • https://www.exploit-db.com/exploits/6474 http://secunia.com/advisories/30063 http://www.coresecurity.com/?action=item&id=2187 http://www.kb.cert.org/vuls/id/596268 http://www.securityfocus.com/archive/1/491623/100/0/threaded http://www.securityfocus.com/bid/28974 http://www.securitytracker.com/id?1019966 https://exchange.xforce.ibmcloud.com/vulnerabilities/42221 • CWE-399: Resource Management Errors •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Invensys Wonderware InTouch 8.0 creates a NetDDE share with insecure permissions (Everyone/Full Control), which allows remote authenticated attackers, and possibly anonymous users, to execute arbitrary programs. Invensys Wonderware InTouch versión 8.0, crea un recurso compartido NetDDE con permisos no seguros (Everyone/Full Control), que permite a atacantes autenticados remotos, y posiblemente a usuarios anónimos, ejecutar programas arbitrarios. • http://osvdb.org/42398 http://pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsThreadID=2&NewsID=201804 http://secunia.com/advisories/27751 http://www.digitalbond.com/index.php/2007/11/19/wonderware-intouch-80-netdde-vulnerability-s4-preview http://www.kb.cert.org/vuls/id/138633 http://www.securityfocus.com/bid/26496 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in intouch.lib.php in inTouch 0.5.1 Alpha allows remote attackers to execute arbitrary SQL commands via the user parameter. Vulnerabilidad de inyección de SQL en intouch.lib.php de inTouch 0.5.1 Alpha permite a atacantes remotos ejecutar órdenes SQL de su elección mediante el parámetro "user". • https://www.exploit-db.com/exploits/27003 http://evuln.com/vulns/8/summary.html http://www.osvdb.org/22382 http://www.securityfocus.com/archive/1/420672/100/0/threaded http://www.securityfocus.com/bid/16110 http://www.vupen.com/english/advisories/2006/0026 https://exchange.xforce.ibmcloud.com/vulnerabilities/23954 •