Page 2 of 52 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 1

An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses. Se descubrió un problema en las versiones R2020 y anteriores de AVEVA Edge (anteriormente InduSoft Web Studio). La aplicación permite a un cliente proporcionar una cadena de conexión maliciosa que podría permitir a un adversario escanear puertos de la LAN, dependiendo de las respuestas de los hosts. • https://www.aveva.com/en/products/edge https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in ExecuteCommand() in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior that allows unauthenticated arbitrary commands to be executed. Se descubrió un problema en ExecuteCommand() en las versiones R2020 y anteriores de AVEVA Edge (anteriormente InduSoft Web Studio) que permite ejecutar comandos arbitrarios no autenticados. • https://www.aveva.com/en/products/edge https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior allows an unauthenticated user to steal the Windows access token of the user account configured for accessing external DB resources. Vulnerabilidad de path traversal en las versiones R2020 y anteriores de AVEVA Edge (anteriormente InduSoft Web Studio) permite que un usuario no autenticado robe el token de acceso de Windows de la cuenta de usuario configurada para acceder a recursos de base de datos externos. • https://www.aveva.com/en/products/edge https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.1EPSS: 0%CPEs: 40EXPL: 0

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service. Esta vulnerabilidad de control externo, si se explota, podría permitir que un usuario local autenticado en el sistema operativo con privilegios estándar elimine archivos con privilegios de sistema en la máquina donde están instalados estos productos, lo que resultaría en una denegación de servicio. • https://www.aveva.com/en/support-and-success/cyber-security-updates https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01 • CWE-73: External Control of File Name or Path CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 7.8EPSS: 0%CPEs: 40EXPL: 0

This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine. Esta vulnerabilidad de escalada de privilegios, si se explota, en la nube permite que un usuario local autenticado en el sistema operativo con privilegios estándar escale a privilegios del sistema en la máquina donde están instalados estos productos, lo que resulta en un compromiso total de la máquina de destino. • https://www.aveva.com/en/support-and-success/cyber-security-updates https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01 • CWE-250: Execution with Unnecessary Privileges •