Vulnerabilities (CVE)

Total 316226 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-10631 1 Advantech 1 Webaccess\/nms 2024-11-21 7.5 HIGH 9.8 CRITICAL
An attacker could use a specially crafted URL to delete or read files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
CVE-2020-10630 1 Sae-it 2 Net-line Fw-50, Net-line Fw-50 Firmware 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAE IT-systems FW-50 Remote Telemetry Unit (RTU). The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in the output used as a webpage that is served to other users.
CVE-2020-10629 1 Advantech 1 Webaccess\/nms 2024-11-21 5.0 MEDIUM 7.5 HIGH
WebAccess/NMS (versions prior to 3.0.2) does not sanitize XML input. Specially crafted XML input could allow an attacker to read sensitive files.
CVE-2020-10628 1 Honeywell 4 Controledge Plc, Controledge Plc Firmware, Controledge Rtu and 1 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
ControlEdge PLC (R130.2, R140, R150, and R151) and RTU (R101, R110, R140, R150, and R151) exposes unencrypted passwords on the network.
CVE-2020-10627 1 Omnipod 2 Insulin Management System, Insulin Management System Firmware 2024-11-21 4.8 MEDIUM 7.3 HIGH
Insulet Omnipod Insulin Management System insulin pump product ID 19191 and 40160 is designed to communicate using a wireless RF with an Insulet manufactured Personal Diabetes Manager device. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with access to one of the affected insulin pump models may be able to modify and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.
CVE-2020-10626 2 Fazecast, Schneider-electric 2 Jserialcomm, Ecostruxure It Gateway 2024-11-21 6.9 MEDIUM 7.8 HIGH
In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
CVE-2020-10625 1 Advantech 1 Webaccess\/nms 2024-11-21 7.5 HIGH 9.8 CRITICAL
WebAccess/NMS (versions prior to 3.0.2) allows an unauthenticated remote user to create a new admin account.
CVE-2020-10624 1 Honeywell 4 Controledge Plc, Controledge Plc Firmware, Controledge Rtu and 1 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
ControlEdge PLC (R130.2, R140, R150, and R151) and RTU (R101, R110, R140, R150, and R151) exposes a session token on the network.
CVE-2020-10623 1 Advantech 1 Webaccess\/nms 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Multiple vulnerabilities could allow an attacker with low privileges to perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information.
CVE-2020-10622 1 Lcds 1 Laquis Scada 2024-11-21 6.8 MEDIUM 7.8 HIGH
LCDS LAquis SCADA Versions 4.3.1 and prior. The affected product is vulnerable to arbitrary file creation by unauthorized users
CVE-2020-10621 1 Advantech 1 Webaccess\/nms 2024-11-21 10.0 HIGH 9.8 CRITICAL
Multiple issues exist that allow files to be uploaded and executed on the WebAccess/NMS (versions prior to 3.0.2).
CVE-2020-10620 1 Opto22 1 Softpac Project 2024-11-21 7.5 HIGH 9.8 CRITICAL
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely.
CVE-2020-10619 1 Advantech 1 Webaccess\/nms 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
An attacker could use a specially crafted URL to delete files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
CVE-2020-10618 1 Lcds 1 Laquis Scada 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
LCDS LAquis SCADA Versions 4.3.1 and prior. The affected product is vulnerable to sensitive information exposure by unauthorized users.
CVE-2020-10617 1 Advantech 1 Webaccess\/nms 2024-11-21 5.0 MEDIUM 7.5 HIGH
There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information.
CVE-2020-10616 1 Opto22 1 Softpac Project 2024-11-21 6.8 MEDIUM 8.8 HIGH
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts.
CVE-2020-10615 1 Trianglemicroworks 1 Scada Data Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers cause a denial-of-service condition due to a lack of proper validation of the length of user-supplied data, prior to copying it to a fixed-length stack-based buffer. Authentication is not required to exploit this vulnerability.
CVE-2020-10614 1 Osisoft 1 Pi Vision 2024-11-21 3.5 LOW 4.8 MEDIUM
In OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display.
CVE-2020-10613 1 Trianglemicroworks 1 Scada Data Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers to disclose sensitive information due to the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. Authentication is not required to exploit this vulnerability. Only applicable to installations using DNP3 Data Sets.
CVE-2020-10612 1 Opto22 1 Softpac Project 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.