Page 22 of 373 results (0.013 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

13 Dec 2019 — In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow vulnerabilities exist in the file transfer service listening on the TCP port. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code with the privileges of the user running DiagAnywhere Server. En Advantech DiagAnywhere Server, versiones 3.07.11 y anteriores, existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en el servicio de trans... • https://www.us-cert.gov/ics/advisories/icsa-19-346-01 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 11%CPEs: 1EXPL: 1

12 Dec 2019 — Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code or cause a denial of service (memory corruption) due to a stack-based buffer overflow when handling IOCTL 70533 RPC messages. Advantech WebAccess versiones anteriores a 8.4.3, permite a atacantes remotos no autenticados ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) debido a un desbordamiento del búfer en la región stack de la memoria al manejar mensajes IOCTL 70533 RPC. • https://www.tenable.com/security/research/tra-2019-52 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information. Advantech WISE-PaaS/RMM, versiones 3.3.29 y anteriores. Una falta de saneamiento de la entrada suministrada por el usuario causa vulnerabilidades de inyección SQL. • https://www.us-cert.gov/ics/advisories/icsa-19-304-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

31 Oct 2019 — Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data. Advantech WISE-PaaS/RMM, versiones 3.3.29 y anteriores. Se presentan vulnerabilidades de tipo XXE que pueden permitir una divulgación de datos confidenciales. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. • https://www.us-cert.gov/ics/advisories/icsa-19-304-01 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. There is an unsecured function that allows anyone who can access the IP address to use the function without authentication. Advantech WISE-PaaS/RMM, versiones 3.3.29 y anteriores. Se presenta una función no segura que permite a cualquiera que pueda acceder a la dirección IP usar la función sin autenticación. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WISE-PaaS/RMM. • https://www.us-cert.gov/ics/advisories/icsa-19-304-01 • CWE-306: Missing Authentication for Critical Function CWE-862: Missing Authorization •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

31 Oct 2019 — Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Path traversal vulnerabilities are caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage these vulnerabilities to remotely execute code while posing as an administrator. Advantech WISE-PaaS/RMM, versiones 3.3.29 y anteriores. Las vulnerabilidades de salto de ruta son causadas por la falta de comprobación apropiada de una ruta suministrada por el usuario antes de su uso en las operaciones de ... • https://www.us-cert.gov/ics/advisories/icsa-19-304-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Sep 2019 — In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918. En Advantech WebAccess/HMI Designer versión 2.1.9.31, los Datos desde una Dirección en Fallo controlan el Flujo de Código que inicia en PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918. • http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Sep 2019 — Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c. Advantech WebAccess/HMI Designer versión 2.1.9.31, presenta un User Mode Write AV que inicia en MSVCR90!Memcpy+0x000000000000015c. • http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Sep 2019 — Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4. Advantech WebAccess/HMI Designer versión 2.1.9.31 presenta corrupción en Exception Handler Chain que inicia en Unknown Symbol @ 0x0000000000000000 llamado desde ntdll! RtlRaiseStatus+0x00000000000000b4. • http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2019 — In WebAccess versions 8.4.1 and prior, an exploit executed over the network may cause improper control of generation of code, which may allow remote code execution, data exfiltration, or cause a system crash. En WebAccess versiones 8.4.1 y anteriores, una explotación ejecutada por medio de la red puede causar un control inapropiado de la generación de código, lo que puede permitir la ejecución de código remota, la filtración de datos o un causar un bloqueo del sistema. • https://www.us-cert.gov/ics/advisories/icsa-19-260-01 • CWE-94: Improper Control of Generation of Code ('Code Injection') •