Page 44 of 750 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 12EXPL: 0

A CVE-352 Cross-Site Request Forgery (CSRF) vulnerability exists that could allow an attacker to impersonate the user or carry out actions on their behalf when crafted malicious parameters are submitted in POST requests sent to the charging station web server. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2) Se presenta una vulnerabilidad CVE-352 de tipo Cross-Site Request Forgery (CSRF) que podría permitir a un atacante hacerse pasar por el usuario o llevar a cabo acciones en su nombre cuando son enviados parámetros maliciosos diseñados en peticiones POST enviadas al servidor web de la estación de carga. Productos afectados: EVlink City EVC1S22P4 / EVC1S7P4 (Todas las versiones anteriores a R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (Todas las versiones anteriores a R8 V3.4.0.2), y EVlink Smart Wallbox EVB1A (Todas las versiones anteriores a R8 V3.4.0.2) • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could allow a remote code execution when a file is saved. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior) Una CWE-22: Se presenta una vulnerabilidad de Limitación Inapropiada de un Nombre de Ruta a un Directorio Restringido ("Path Traversal") que podría permitir una ejecución de código remota cuando es guardado un archivo. Producto afectado: C-Bus Toolkit (versiones V1.15.9 y anteriores), C-Gate Server (versiones V2.11.7 y anteriores) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of commands sent to the C-Gate 2 Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

A CWE-269: Improper Privilege Management vulnerability exists that could cause an arbitrary command execution when the software is configured with specially crafted event actions. Affected Product: ConneXium Network Manager Software (All Versions) Una CWE-269: Se presenta una vulnerabilidad de Administración de Privilegios Inapropiada que podría causar una ejecución de un comando arbitrario cuando el software está configurado con acciones de eventos especialmente diseñados. Producto afectado: Software ConneXium Network Manager (todas las versiones) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric ConneXium Network Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of CXN files. The product UI does not warn the user of unsafe actions. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02 • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution due to missing length check on user supplied data, when a constructed message is received on the network. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior) Una CWE-120: Se presenta una vulnerabilidad de Copia del búfer sin Comprobar el Tamaño de la Entrada que podría resultar en una ejecución de código remota debido a una falta de comprobación de la longitud de los datos suministrados por el usuario, cuando es recibido un mensaje construido en la red. Producto afectado: Interactive Graphical SCADA System Data Collector (dc.exe) (versiones V15.0.0.21243 y anteriores) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of TCP traffic by the dc.exe process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could lead to remote code execution through a number of paths, when an attacker, writes arbitrary files to folders in context of the DC module, by sending constructed messages on the network. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior) Una CWE-434: Se presenta una vulnerabilidad de Carga no Restringida de Archivos con Tipo Peligroso que podría conllevar a una ejecución de código remota mediante una serie de rutas, cuando un atacante, escribe archivos arbitrarios en carpetas en el contexto del módulo DC, mediante el envío de mensajes construidos en la red. Producto afectado: Interactive Graphical SCADA System Data Collector (dc.exe) (versiones V15.0.0.21243 y anteriores) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of TCP traffic by the dc.exe process. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03 • CWE-434: Unrestricted Upload of File with Dangerous Type •