Page 7 of 49 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

UPS companion software v1.05 & Prior is affected by ‘Eval Injection’ vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed. UPS companion software versiones v1.05 y anteriores, está afectado por una vulnerabilidad de "Eval Injection". El software no neutraliza o neutraliza incorrectamente una sintaxis del código antes de usar la entrada en una llamada de evaluación dinámica, por ejemplo, "eval" en una clase "Update Manager" cuando el software intenta visualizar si existen actualizaciones disponibles. • https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-UPS-companion-software.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator. Se descubrió un problema en los dispositivos Eaton 5P 850. El campo Ubicacion SAI permite ataques de tipo XSS por parte de un administrador. • https://sku11army.blogspot.com/2020/01/eaton-authenticated-stored-cross-site.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

The Android mobile application Halo Home before 1.11.0 stores OAuth authentication and refresh access tokens in a clear text file. This file persists until the user logs out of the application and reboots the device. This vulnerability can allow an attacker to impersonate the legitimate user by reusing the stored OAuth token, thus allowing them to view and change the user's personal information stored in the backend cloud service. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app. La aplicación móvil de Android Halo Home versión anterior a 1.11.0, almacena la autenticación OAuth y actualiza los tokens de acceso en un archivo de texto sin cifrar. • https://blog.rapid7.com/2019/05/21/investigating-the-plumbing-of-the-iot-ecosystem-r7-2018-65-r7-2019-07-fixed https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/CVE-2019-5625-Halo-home-smart-lighting-vulnerability-advisory.pdf • CWE-522: Insufficiently Protected Credentials CWE-922: Insecure Storage of Sensitive Information •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the user's password. The web page displayed by the appliance contains the password in cleartext. Passwords could be retrieved by browsing the source code of the webpage. Se ha descubierto un problema en dispositivos Eaton UPS 9PX 8000 SP. • https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities • CWE-522: Insufficiently Protected Credentials •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the SNMP version 3 user's password. The web page displayed by the appliance contains the password in cleartext. Passwords of the read and write users could be retrieved by browsing the source code of the webpage. Se ha descubierto un problema en dispositivos Eaton UPS 9PX 8000 SP. • https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities • CWE-522: Insufficiently Protected Credentials •