Page 26 of 130 results (0.010 seconds)

CVSS: 6.9EPSS: 0%CPEs: 4EXPL: 0

Untrusted search path vulnerability in ABB RobotStudio 5.6x before 5.61.02 and Test Signal Viewer 1.5 allows local users to gain privileges via a Trojan horse DLL that is accessed as a result of incorrect DLL configuration by an optional installation program. Vulnerabilidad de ruta de búsqueda no confiable en ABB RobotStudio 5.6x anterior a 5.61.02 y Test Signal Viewer 1.5 permite a usuarios locales ganar privilegios a través de un DLL tryano al que se accede como resultado de una configuración DLL incorrecta por un programa de instalación opcional. • https://ics-cert.us-cert.gov/advisories/ICSA-14-308-01 •

CVSS: 9.3EPSS: 88%CPEs: 6EXPL: 0

Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 through 6.3.6, and other products allow remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method in the (1) CWNumEdit, (2) CWGraph, (3) CWBoolean, (4) CWSlide, or (5) CWKnob ActiveX control, in conjunction with file content in the (a) Caption or (b) FormatString property value. Múltiples vulnerabilidades de salto de ruta (path) en el archivo cwui.ocx de National Instruments , como se usado en National Instruments LabWindows/CVI 2012 SP1 y anteriores, National Instruments LabVIEW 2012 SP1 y anteriores, el componente de Data Analysis en ABB DataManager versión 1 hasta 6.3.6, y otros productos permiten atacantes remotos crear y ejecutar archivos arbitrarios por medio de un acceso de ruta (path) completo en un argumento del método ExportStyle en el control de (1) CWNumEdit, (2) CWGraph, (3) CWBoolean, (4) CWSlide o (5) ActiveX CWKnob, en conjunción con el contenido del archivo en el valor de la propiedad (a) Caption o (b) FormatString. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB DataManager Data Analysis. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within multiple 3rd party CWUI activex controls. CWNumEdit, CWGraph, CWBoolean, CWSlide, and CWKnob all support an ExportStyle() method that allows creation of an arbitrary file with the desired extension and inside an arbitrary location. • http://digital.ni.com/public.nsf/allkb/04B876608790082C86257BD1000CC950?OpenDocument http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument http://www05.abb.com/global/scot/scot203.nsf/veritydisplay/5975a8a86c82eec2c125798e00551522/%24file/SECURITY_BULLETIN_-_ABBVU-PACT-3BSE072617_DataManager_Vulnerability.pdf http://zerodayinitiative.com/advisories/ZDI-13-120 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.7EPSS: 1%CPEs: 7EXPL: 0

Multiple stack-based buffer overflows in (1) COM and (2) ActiveX controls in ABB WebWare Server, WebWare SDK, Interlink Module, S4 OPC Server, QuickTeach, RobotStudio S4, and RobotStudio Lite allow remote attackers to execute arbitrary code via crafted input data. Múltiples desbordamientos de búfer basados ??en la pila en controles (1) COM y (2) ActiveX en ABB WebWare Server SDK WebWare, Módulo de Interlink, S4 Servidor OPC, QuickTeach, S4 RobotStudio y RobotStudio Lite permite a atacantes remotos ejecutar código arbitrario a través de la entrada modificada. • http://secunia.com/advisories/48693 http://www.securityfocus.com/bid/52888 http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01A.pdf http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/%24file/SI10231A2%20rev%200.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 18%CPEs: 10EXPL: 0

Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime before 5.14.02, as used in ABB Interlink Module, IRC5 OPC Server, PC SDK, PickMaster 3 and 5, RobView 5, RobotStudio, WebWare SDK, and WebWare Server, allow remote attackers to execute arbitrary code via a crafted (1) 0xA or (2) 0xE Netscan packet. Múltiples vulnerabilidades de desbordamiento de búfer basados ??en pila en RobNetScanHost.exe en ABB Robot Comunications Runtime antes de v5.14.02, tal y como se utiliza en el módulo ABB Interlink, IRC5 OPC Server, PC SDK, PickMaster v3 y v5, RobView v5, RobotStudio, WebWare SDK, y WebWare Server, permiten a atacantes remotos ejecutar código de su elección a través de un paquete Netscan (1) 0xA o (2) 0xE específicamente modificado para este fin. • http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.html http://secunia.com/advisories/48090 http://www.securityfocus.com/bid/52123 http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdf http://www.zerodayinitiative.com/advisories/ZDI-12-033 http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 5%CPEs: 3EXPL: 0

Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface. Desbordamiento de búfer en x87 anteriores a v3.5.5 en ABB Process Comunicatión Unit 400 (PCU400) v4.4 hasta v4.6, permite a atacantes remotos ejecutar código arbitrario a través de un paquete manipulado utilizando los protocolos de comunicación (1)IEC60870-5-101 o (2) IEC60870-5-104 para el interfaz web del X87. • http://secunia.com/advisories/32047 http://securityreason.com/securityalert/4320 http://www.kb.cert.org/vuls/id/343971 http://www.kb.cert.org/vuls/id/CTAR-7JTNRX http://www.securityfocus.com/archive/1/496739/100/0/threaded http://www.securityfocus.com/bid/31391 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •