Filtered by vendor Advantech
Subscribe
Total
296 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-5848 | 1 Advantech | 14 Adam-6015, Adam-6017, Adam-6018 and 11 more | 2024-02-14 | 10.0 HIGH | N/A |
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity. | |||||
CVE-2023-1437 | 1 Advantech | 1 Webaccess\/scada | 2024-02-01 | N/A | 9.8 CRITICAL |
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files. | |||||
CVE-2022-3387 | 1 Advantech | 1 R-seenet | 2023-11-07 | N/A | 5.3 MEDIUM |
Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. | |||||
CVE-2022-3386 | 1 Advantech | 1 R-seenet | 2023-11-07 | N/A | 9.8 CRITICAL |
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. | |||||
CVE-2022-3385 | 1 Advantech | 1 R-seenet | 2023-11-07 | N/A | 9.8 CRITICAL |
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution. | |||||
CVE-2018-14828 | 1 Advantech | 1 Webaccess | 2023-11-07 | 7.2 HIGH | 7.8 HIGH |
Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level. | |||||
CVE-2018-14820 | 1 Advantech | 1 Webaccess | 2023-11-07 | 6.4 MEDIUM | 7.5 HIGH |
Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing. | |||||
CVE-2018-14816 | 1 Advantech | 1 Webaccess | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code. | |||||
CVE-2018-14806 | 1 Advantech | 1 Webaccess | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker to execute arbitrary code. | |||||
CVE-2023-5642 | 1 Advantech | 1 R-seenet | 2023-10-25 | N/A | 9.8 CRITICAL |
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. | |||||
CVE-2023-4215 | 1 Advantech | 1 Webaccess | 2023-10-20 | N/A | 7.5 HIGH |
Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials. | |||||
CVE-2023-4203 | 1 Advantech | 6 Eki-1521, Eki-1521 Firmware, Eki-1522 and 3 more | 2023-08-14 | N/A | 5.4 MEDIUM |
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the ping tool of the web-interface. | |||||
CVE-2023-4202 | 1 Advantech | 6 Eki-1521, Eki-1521 Firmware, Eki-1522 and 3 more | 2023-08-14 | N/A | 5.4 MEDIUM |
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the device name field of the web-interface. | |||||
CVE-2023-3983 | 1 Advantech | 1 Iview | 2023-08-04 | N/A | 8.8 HIGH |
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection. | |||||
CVE-2022-2143 | 1 Advantech | 1 Iview | 2023-07-24 | N/A | 9.8 CRITICAL |
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2023-3256 | 1 Advantech | 1 R-seenet | 2023-06-28 | N/A | 8.1 HIGH |
Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files. | |||||
CVE-2023-2611 | 1 Advantech | 1 R-seenet | 2023-06-28 | N/A | 9.8 CRITICAL |
Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users. | |||||
CVE-2023-2866 | 1 Advantech | 1 Webaccess | 2023-06-15 | N/A | 7.8 HIGH |
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. | |||||
CVE-2023-22450 | 1 Advantech | 1 Webaccess\/scada | 2023-06-12 | N/A | 7.2 HIGH |
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution. | |||||
CVE-2023-32540 | 1 Advantech | 1 Webaccess\/scada | 2023-06-12 | N/A | 9.8 CRITICAL |
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. |