Note:
This project will be discontinued after December 13, 2021. [more]
Product:
R\-Seenet
(Advantech)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 40 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-10-27 | CVE-2022-3387 | Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. | R\-Seenet | 5.3 | ||
2022-10-27 | CVE-2022-3385 | Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution. | R\-Seenet | 9.8 | ||
2022-10-27 | CVE-2022-3386 | Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. | R\-Seenet | 9.8 | ||
2023-10-18 | CVE-2023-5642 | Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. | R\-Seenet | 9.8 | ||
2023-06-22 | CVE-2023-3256 | Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files. | R\-Seenet | 8.1 | ||
2023-06-22 | CVE-2023-2611 | Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users. | R\-Seenet | 9.8 | ||
2021-12-22 | CVE-2021-21912 | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | R\-Seenet | 7.8 | ||
2021-12-22 | CVE-2021-21936 | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘health_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | R\-Seenet | 8.8 | ||
2021-07-16 | CVE-2021-21799 | Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability. | R\-Seenet | 6.1 | ||
2021-07-16 | CVE-2021-21800 | Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability. | R\-Seenet | 6.1 |