Advantech

R-seenet

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.19%
  • Veröffentlicht 22.12.2021 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:49:14

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘username_filter’ parameter with the administrative account or through cross-site request forgery.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 22.12.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:13

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An...

Exploit
  • EPSS 91.62%
  • Veröffentlicht 05.08.2021 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:49:00

An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to...

Exploit
  • EPSS 27.81%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:00

A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP requ...

Exploit
  • EPSS 73.89%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:00

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Exploit
  • EPSS 66.83%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:00

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Exploit
  • EPSS 84.6%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:00

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Exploit
  • EPSS 68.44%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:48:59

Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the target...

Exploit
  • EPSS 75.91%
  • Veröffentlicht 16.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:48:59

Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the tar...

  • EPSS 0.19%
  • Veröffentlicht 20.10.2020 22:15:43
  • Zuletzt bearbeitet 21.11.2024 05:17:29

The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information.