Page 3 of 23 results (0.008 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

A Stack-based Buffer Overflow issue was discovered in GE CIMPLICITY Versions 9.0 and prior. A function reads a packet to indicate the next packet length. The next packet length is not verified, allowing a buffer overwrite that could lead to an arbitrary remote code execution. Se ha descubierto un problema de desbordamiento de búfer basado en pila en GE CIMPLICITY en versiones 1.6.30.144 y anteriores. Un función lee un paquete para indicar la longitud del siguiente paquete. • http://www.securityfocus.com/bid/101174 https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session. Se encontró un problema en General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 y versiones anteriores, Proficy HMI/SCADA CIMPLICITY Versión 9.0 y versiones anteriores y Proficy Historian Versión 6.0 y versiones anteriores. Un atacante puede recuperar contraseñas de usuario si tiene acceso a una sesión autenticada. • http://www.securityfocus.com/bid/95630 http://www.securitytracker.com/id/1037809 https://ics-cert.us-cert.gov/advisories/ICSA-16-336-05A • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.3EPSS: 0%CPEs: 27EXPL: 0

General Electric (GE) Digital Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 27 mishandles service DACLs, which allows local users to modify a service configuration via unspecified vectors. General Electric (GE) Digital Proficy HMI/SCADA - CIMPLICITY en versiones anteriores a 8.2 SIM 27 no maneja adecuadamente el servicio DACLs, lo que permite a usuarios locales modificar una configuración de servicio a través de vectores no especificados. • http://www.securityfocus.com/bid/91727 https://ge-ip.force.com/communities/en_US/Article/GE-Digital-Security-Advisory-GED-16-01 https://ics-cert.us-cert.gov/advisories/ICSA-16-194-02 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

The (1) CimView and (2) CimEdit components in GE Proficy HMI/SCADA-CIMPLICITY 8.2 and earlier allow remote attackers to gain privileges via a crafted CIMPLICITY screen (aka .CIM) file. Los componentes (1) CimView y (2) CimEdit en GE Proficy HMI/SCADA-CIMPLICITY 8.2 y anteriores permiten a atacantes remotos ganar privilegios a través de un fichero de pantalla CIMPLICITY manipulado (también conocido como .CIM). • https://ics-cert.us-cert.gov/advisories/ICSA-14-289-02 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 31%CPEs: 7EXPL: 0

Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted message to TCP port 10212, aka ZDI-CAN-1623. Vulnerabilidad de salto de directorio en CimWebServer.exe (también conocido como el componente WebView) en GE Intelligent Platforms Proficy HMI / SCADA - CIMPLICITY anterior a 8.2 SIM 24 y Proficy Process con CIMPLICITY, permite a atacantes remotos ejecutar código arbitrario a través de un mensaje manipulado a puerto TCP 10212 , también conocido como ZDI-CAN-1623. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy CIMPLICITY. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. • http://ics-cert.us-cert.gov/advisories/ICSA-14-023-01 http://support.ge-ip.com/support/index?page=kbchannel&id=KB15940 http://www.securityfocus.com/bid/65117 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •