Filtered by vendor Advantech
Subscribe
Total
296 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-2138 | 1 Advantech | 1 Iview | 2023-12-10 | N/A | 7.5 HIGH |
The affected product is vulnerable due to missing authentication, which may allow an attacker to read or modify sensitive data and execute arbitrary code, resulting in a denial-of-service condition. | |||||
CVE-2022-3386 | 1 Advantech | 1 R-seenet | 2023-12-10 | N/A | 9.8 CRITICAL |
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. | |||||
CVE-2022-3387 | 1 Advantech | 1 R-seenet | 2023-12-10 | N/A | 5.3 MEDIUM |
Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. | |||||
CVE-2022-3323 | 1 Advantech | 1 Iview | 2023-12-10 | N/A | 7.5 HIGH |
An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password. | |||||
CVE-2022-2139 | 1 Advantech | 1 Iview | 2023-12-10 | N/A | 9.8 CRITICAL |
The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code. | |||||
CVE-2022-2143 | 1 Advantech | 1 Iview | 2023-12-10 | N/A | 9.8 CRITICAL |
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2022-2135 | 1 Advantech | 1 Iview | 2023-12-10 | N/A | 7.5 HIGH |
The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information. | |||||
CVE-2021-21920 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 4.9 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘surname_filter’ parameter with the administrative account or through cross-site request forgery. | |||||
CVE-2021-21910 | 2 Advantech, Microsoft | 2 R-seenet, Windows | 2023-12-10 | 7.2 HIGH | 7.8 HIGH |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-40397 | 1 Advantech | 1 Wise-paas\/ota | 2023-12-10 | 9.3 HIGH | 7.8 HIGH |
A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.0.9. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-21930 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘sn_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-21932 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘name_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-21934 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘imei_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-38389 | 1 Advantech | 1 Webaccess | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code. | |||||
CVE-2021-21929 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘prod_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-21916 | 1 Advantech | 1 R-seenet | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-33023 | 1 Advantech | 1 Webaccess | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code. | |||||
CVE-2021-21912 | 2 Advantech, Microsoft | 2 R-seenet, Windows | 2023-12-10 | 7.2 HIGH | 7.8 HIGH |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-21924 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘desc_filter’ parameter. | |||||
CVE-2021-21933 | 1 Advantech | 1 R-seenet | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘esn_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. |