ChromiumCart 0.8.1 Arbitrary File Upload
ChromiumCart version 0.8.1 suffers from an arbitrary file upload vulnerability.
ChromiumCart version 0.8.1 suffers from an arbitrary file upload vulnerability.
EvolutionScript version 5.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
Deadlock version 1.01 suffers from an arbitrary file upload vulnerability.
DMarket version 1.0 suffers from a remote PHP code injection vulnerability.
Docebo LMS version 4.0.3 suffers from a cross site scripting vulnerability.
Circutor PowerStudio SCADA version 4.0.5 suffers from an unquoted search path issue impacting the services ‘CircutorPowerStudioScadaServer’ and ‘CircutorPowerStudioServer’ for Windows deployed as part of PowerStudio Series. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to […]
iniNet SpiderControl SCADA Editor version 6.30.01 suffers from an insecure file permission vulnerability that can lead to privilege escalation.
SpiderControl PLC Editor Simatic suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (Full) for ‘Everyone’ group, and ‘C’ flag (Change) for ‘Authenticated Users’ group making […]
SpiderControl SCADA Web Server Service suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘C’ flag (Change) for ‘Everyone’ and ‘Authenticated Users’ group making the entire directory ‘WWW’ […]
GEOVAP Reliance 4 Control Server suffers from an unquoted search path issue impacting the service ‘RelianceOpcDaWrapper’ for Windows deployed as part of Reliance 4 SCADA/HMI system installer including Reliance OPC Server. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would […]