Apc

Powerchute

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.55%
  • Published 31.08.2020 17:15:12
  • Last modified 21.11.2024 05:37:18

Improper Input Validation vulnerability exists in PowerChute Business Edition (software V9.0.x and earlier) which could cause remote code execution when a script is executed during a shutdown event.

  • EPSS 0.23%
  • Published 07.12.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  • EPSS 1.92%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in APC PowerChute Business Edition 6.0 through 7.0.1 allows remote attackers to cause a denial of service via unknown attack vectors.

  • EPSS 0.63%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

PowerChute plus 5.0.2 creates a "Pwrchute" directory during installation that is shared and world writeable, which could allow remote attackers to modify or create files in that directory.

  • EPSS 0.77%
  • Published 31.12.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

The HTTP service in American Power Conversion (APC) PowerChute uses a default username and password, which allows remote attackers to gain system access.