Page 6 of 28 results (0.003 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

The GENESIS32 IcoSetServer ActiveX control in ICONICS GENESIS32 9.21 and BizViz 9.21 configures the trusted zone on the basis of user input, which allows remote attackers to execute arbitrary code via a crafted web site, related to a "Workbench32/WebHMI component SetTrustedZone Policy vulnerability." El control ActiveX GENESIS32 IcoSetServer en ICONICS GENESIS32 v9.21 y BizViz v9.21 configura la zona de confianza sobre la base de datos del usuario, lo que permite a atacantes remotos ejecutar código arbitrario a través de un sitio web modificado, relaciónado con una "Workbench32/WebHMI component SetTrustedZone Policy vulnerability." • http://www.us-cert.gov/control_systems/pdf/ICSA-11-182-01.pdf •

CVSS: 9.3EPSS: 50%CPEs: 14EXPL: 7

Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en el método SetActiveXGUID en el control VersionInfo ActiveX en GenVersion.dll v8.0.138.0 en el subsistema WebHMI en ICONICS BizViz v9.x anterior a v9.22 y GENESIS32 v9.x anterior a v9.22 permite a atacantes remotos ejecutar código de su lección a través de una cadena larga en el argumento. NOTA: alguno de estos detalles son obtenidos de terceras partes de información • https://www.exploit-db.com/exploits/17269 https://www.exploit-db.com/exploits/17240 http://secunia.com/advisories/44417 http://www.exploit-db.com/exploits/17240 http://www.exploit-db.com/exploits/17269 http://www.osvdb.org/72135 http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf http://www.securityfocus.com/bid/47704 http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdf http://www.vupen.com/english/advisories/2011/1174 https:&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 11%CPEs: 1EXPL: 1

Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument. Desbordamiento de búfer basado en pila en la función DoModal en el control de ActiveX Dialog Wrapper Module (DlgWrapper.dll) anterior a la 8.4.166.0, como el utilizado en el ICONICS OPC Enabled Gauge, Switch y Vessel ActiveX, permite a atacantes remotos la ejecución de código mediante un argumento largo en el (1) FileName or (2) Filter. • https://www.exploit-db.com/exploits/6570 http://osvdb.org/32552 http://secunia.com/advisories/23583 http://www.kb.cert.org/vuls/id/251969 http://www.securityfocus.com/bid/21849 http://www.vupen.com/english/advisories/2007/0025 https://exchange.xforce.ibmcloud.com/vulnerabilities/31228 •