Page 6 of 34 results (0.002 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting vulnerability in Sales Force Assistant version 11.2.48 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad de tipo Cross-site scripting en Sales Force Assistant versiones anteriores a 11.2.48, permite a atacantes autenticados remotamente inyectar script web o HTML arbitrario por medio de vectores no especificados. • http://jvn.jp/en/jp/JVN47668991/index.html http://ni-consul.jp/support/info/2020/20200424_ge.html https://jvn.jp/en/jp/JVN47668991/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 2

An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution. Existe una vulnerabilidad de corrupción de memoria explotable en la funcionalidad de análisis de segmentos RSRC de LabVIEW 2017, LabVIEW 2016, LabVIEW 2015 y LabVIEW 2014. Un archivo de Instrumento Virtual (VI) especialmente diseñado puede causar una condición de bucle controlada por un atacante que resulta en una escritura nula arbitraria. • http://www.ni.com/product-documentation/54099/en http://www.securityfocus.com/bid/100519 https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0273 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 1

An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution. Existe una vulnerabilidad de corrupción de memoria explotable en la funcionalidad LvVariantUnflatten en versiones de LabVIEW de 64 bits anterior a versión 2015 SP1 Parche f7 y versiones 2016 anteriores a Parche f2. Un archivo VI especialmente diseñado puede causar que un valor controlado por el usuario sea usado como un terminador de bucle resultando en una corrupción de pila interna. • http://www.ni.com/product-documentation/53778/en http://www.securityfocus.com/bid/97020 http://www.talosintelligence.com/reports/TALOS-2017-0269 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 1%CPEs: 5EXPL: 0

The ActiveX controls in the HelpAsst component in NI Help Links in National Instruments LabWindows/CVI 2012 SP1 and earlier, LabVIEW 2012 SP1 and earlier, and other products allow remote attackers to cause a denial of service by triggering the display of local .chm files. Vulnerabilidad sin especificar en un control ActiveX en el componente HelpAsst en NI Help Links in National Instruments LabWindows/CVI, LabVIEW, y otros productos, tiene un impacto desconocido y vectores de ataque remotos. • http://digital.ni.com/public.nsf/allkb/E6BC4F119D49A97A86257BD3004FE019?OpenDocument http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument http://digital.ni.com/public.nsf/websearch/5C87A3AA7300868986257B3600501FE6?OpenDocument •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

An ActiveX control in exlauncher.dll in the Help subsystem in National Instruments LabWindows/CVI before 2013 allows remote attackers to cause a denial of service by triggering the display of local example files. Vulnerabilidad sin especificar en un control ActiveX en el subsistema Help en National Instruments LabWindows/CVI anterior a v2013 tiene un impacto y vectores de ataque desconocidos. • http://digital.ni.com/public.nsf/allkb/493D011EE5C305FD86257BCF006C8540?OpenDocument http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument http://digital.ni.com/public.nsf/websearch/DFFB9F8AD5014E9586257B36004F6E5D?OpenDocument •