3 results (0.002 seconds)

CVSS: 6.9EPSS: 0%CPEs: 4EXPL: 0

Untrusted search path vulnerability in ABB RobotStudio 5.6x before 5.61.02 and Test Signal Viewer 1.5 allows local users to gain privileges via a Trojan horse DLL that is accessed as a result of incorrect DLL configuration by an optional installation program. Vulnerabilidad de ruta de búsqueda no confiable en ABB RobotStudio 5.6x anterior a 5.61.02 y Test Signal Viewer 1.5 permite a usuarios locales ganar privilegios a través de un DLL tryano al que se accede como resultado de una configuración DLL incorrecta por un programa de instalación opcional. • https://ics-cert.us-cert.gov/advisories/ICSA-14-308-01 •

CVSS: 7.7EPSS: 1%CPEs: 7EXPL: 0

Multiple stack-based buffer overflows in (1) COM and (2) ActiveX controls in ABB WebWare Server, WebWare SDK, Interlink Module, S4 OPC Server, QuickTeach, RobotStudio S4, and RobotStudio Lite allow remote attackers to execute arbitrary code via crafted input data. Múltiples desbordamientos de búfer basados ??en la pila en controles (1) COM y (2) ActiveX en ABB WebWare Server SDK WebWare, Módulo de Interlink, S4 Servidor OPC, QuickTeach, S4 RobotStudio y RobotStudio Lite permite a atacantes remotos ejecutar código arbitrario a través de la entrada modificada. • http://secunia.com/advisories/48693 http://www.securityfocus.com/bid/52888 http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01A.pdf http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/%24file/SI10231A2%20rev%200.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 18%CPEs: 10EXPL: 0

Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime before 5.14.02, as used in ABB Interlink Module, IRC5 OPC Server, PC SDK, PickMaster 3 and 5, RobView 5, RobotStudio, WebWare SDK, and WebWare Server, allow remote attackers to execute arbitrary code via a crafted (1) 0xA or (2) 0xE Netscan packet. Múltiples vulnerabilidades de desbordamiento de búfer basados ??en pila en RobNetScanHost.exe en ABB Robot Comunications Runtime antes de v5.14.02, tal y como se utiliza en el módulo ABB Interlink, IRC5 OPC Server, PC SDK, PickMaster v3 y v5, RobView v5, RobotStudio, WebWare SDK, y WebWare Server, permiten a atacantes remotos ejecutar código de su elección a través de un paquete Netscan (1) 0xA o (2) 0xE específicamente modificado para este fin. • http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.html http://secunia.com/advisories/48090 http://www.securityfocus.com/bid/52123 http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdf http://www.zerodayinitiative.com/advisories/ZDI-12-033 http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •