Advantech

Webaccess/scada

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.86%
  • Veröffentlicht 10.08.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:58

The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1).

  • EPSS 0.19%
  • Veröffentlicht 10.08.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:27

UserExcelOut.asp within WebAccess/SCADA is vulnerable to cross-site scripting (XSS), which could allow an attacker to send malicious JavaScript code. This could result in hijacking of cookie/session tokens, redirection to a malicious webpage, and uni...

  • EPSS 0.31%
  • Veröffentlicht 10.08.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:27

The affected product is vulnerable to a relative path traversal condition, which may allow an attacker access to unauthorized files and directories on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0...

  • EPSS 0.21%
  • Veröffentlicht 18.06.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:59

Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to a directory traversal, which may allow an attacker to remotely read arbitrary files on the file system.

  • EPSS 0.16%
  • Veröffentlicht 18.06.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:08:00

Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to redirection, which may allow an attacker to send a maliciously crafted URL that could result in redirecting a user to a malicious webpage.

  • EPSS 0.17%
  • Veröffentlicht 26.04.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:26

Incorrect permissions are set to default on the ‘Project Management’ page of WebAccess/SCADA portal of WebAccess/SCADA Versions 9.0.1 and prior, which may allow a low-privileged user to update an administrator’s password and login as an administrator...

  • EPSS 0.19%
  • Veröffentlicht 18.03.2021 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:59

WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user’s cookie/session tokens, redirecting the ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 03.03.2021 17:15:11
  • Zuletzt bearbeitet 21.11.2024 05:01:29

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace...

  • EPSS 0.63%
  • Veröffentlicht 23.02.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:17:30

The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 17.02.2021 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:29

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to e...