Page 4 of 23 results (0.003 seconds)

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has several out-of-bounds read vulnerabilities, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene varias vulnerabilidades de lectura fuera de límites que podrían permitir la ejecución remota de código. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before an allocated buffer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process. LAquis SCADA en versiones 4.1.0.3870 y anteriores, al procesar archivos de proyecto, no sanea las entradas del usuario antes de realizar operaciones de escritura en un objeto de la pila, lo que podría permitir que el atacante ejecute código en el proceso actual. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • http://laquisscada.com/instale1.php https://exchange.xforce.ibmcloud.com/vulnerabilities/151421 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has a path traversal vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de salto de directorio que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151420 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has an untrusted pointer dereference vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de desreferencia de puntero no fiable que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within parsing of LQS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151417 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-476: NULL Pointer Dereference CWE-822: Untrusted Pointer Dereference •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

LAquis SCADA Versions 4.1.0.3870 and prior has several integer overflow to buffer overflow vulnerabilities, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene varias vulnerabilidades de desbordamiento de enteros y desbordamiento de búfer que podrían permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-190: Integer Overflow or Wraparound •