Page 4 of 24 results (0.004 seconds)

CVSS: 8.8EPSS: 5%CPEs: 1EXPL: 0

LCDS Laquis SCADA prior to version 4.1.0.4150 allows taking in user input without proper sanitation, which may allow an attacker to execute remote code on the server. LCDS Laquis SCADA, en versiones anteriores a la 4.1.0.4150, permite la recepción de entradas del usuario sin que estén saneadas correctamente, lo que podría permitir a un atacante ejecutar código remoto en el servidor. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to acompanhamentotela.lhtml. When parsing the TAGALTERE Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. • http://www.securityfocus.com/bid/106634 https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has several out-of-bounds read vulnerabilities, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene varias vulnerabilidades de lectura fuera de límites que podrían permitir la ejecución remota de código. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before an allocated buffer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process. LAquis SCADA en versiones 4.1.0.3870 y anteriores, al procesar archivos de proyecto, no sanea las entradas del usuario antes de realizar operaciones de escritura en un objeto de la pila, lo que podría permitir que el atacante ejecute código en el proceso actual. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • http://laquisscada.com/instale1.php https://exchange.xforce.ibmcloud.com/vulnerabilities/151421 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has a path traversal vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de salto de directorio que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151420 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has an untrusted pointer dereference vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de desreferencia de puntero no fiable que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within parsing of LQS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151417 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-476: NULL Pointer Dereference CWE-822: Untrusted Pointer Dereference •