24 results (0.020 seconds)

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

There are multiple ways in LCDS LAquis SCADA for an attacker to access locations outside of their own directory. Hay varias formas en LCDS LAquis SCADA para que un atacante acceda a ubicaciones fuera de su propio directorio. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the AddComboFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • https://www.cisa.gov/news-events/ics-advisories/icsa-24-142-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting. Cuando es solicitado un recurso no existente, la aplicación LCDS LAquis SCADA (versiones 4.3.1.1011 y anteriores) devuelve mensajes de error que pueden permitir un ataque de tipo cross-site scripting reflejado • https://www.cisa.gov/uscert/ics/advisories/icsa-21-208-04 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

LCDS LAquis SCADA Versions 4.3.1 and prior. The affected product is vulnerable to sensitive information exposure by unauthorized users. LCDS LAquis SCADA versiones 4.3.1 y anteriores. El producto afectado es vulnerable a una exposición de información confidencial por parte de usuarios no autorizados. This vulnerability allows remote attackers to create arbitrary files on affected installations of LAquis SCADA. • https://www.us-cert.gov/ics/advisories/icsa-20-119-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

LCDS LAquis SCADA Versions 4.3.1 and prior. The affected product is vulnerable to arbitrary file creation by unauthorized users LCDS LAquis SCADA versiones 4.3.1 y anteriores. El producto afectado es vulnerable a una creación de archivos arbitrarios por parte de usuarios no autorizados. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the TextFile.Read method when processing LGX files. • https://www.us-cert.gov/ics/advisories/icsa-20-119-01 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Opening a specially crafted LCDS LAquis SCADA before 4.3.1.71 ELS file may result in a write past the end of an allocated buffer, which may allow an attacker to execute remote code in the context of the current process. Abrir un archivo ELS especialmente manipulado de LCDS LAquis SCADA, en versiones anteriores a la 4.3.1.71, podría resultar en una lectura más allá del final de un búfer asignado, lo que podría permitir que un atacante ejecute código remoto en el contexto del proceso actual. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of ELS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://ics-cert.us-cert.gov/advisories/ICSA-19-073-01 https://www.zerodayinitiative.com/advisories/ZDI-19-307 • CWE-787: Out-of-bounds Write •