Vulnerabilities (CVE)

Filtered by vendor Advantech Subscribe
Total 294 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-2136 1 Advantech 1 Iview 2024-02-04 N/A 6.5 MEDIUM
The affected product is vulnerable to multiple SQL injections that require low privileges for exploitation and may allow an unauthorized attacker to disclose information.
CVE-2022-2143 1 Advantech 1 Iview 2024-02-04 N/A 9.8 CRITICAL
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.
CVE-2022-3386 1 Advantech 1 R-seenet 2024-02-04 N/A 9.8 CRITICAL
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.
CVE-2022-2138 1 Advantech 1 Iview 2024-02-04 N/A 7.5 HIGH
The affected product is vulnerable due to missing authentication, which may allow an attacker to read or modify sensitive data and execute arbitrary code, resulting in a denial-of-service condition.
CVE-2022-2139 1 Advantech 1 Iview 2024-02-04 N/A 9.8 CRITICAL
The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code.
CVE-2021-21925 1 Advantech 1 R-seenet 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘firm_filter’ parameter.
CVE-2021-21917 1 Advantech 1 R-seenet 2024-02-04 6.5 MEDIUM 8.8 HIGH
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
CVE-2021-21921 1 Advantech 1 R-seenet 2024-02-04 4.0 MEDIUM 4.9 MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter with the administrative account or through cross-site request forgery.
CVE-2021-33023 1 Advantech 1 Webaccess 2024-02-04 7.5 HIGH 9.8 CRITICAL
Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.
CVE-2021-38431 1 Advantech 1 Webaccess Scada 2024-02-04 4.0 MEDIUM 4.3 MEDIUM
An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users.
CVE-2021-38389 1 Advantech 1 Webaccess 2024-02-04 7.5 HIGH 9.8 CRITICAL
Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.
CVE-2021-21937 1 Advantech 1 R-seenet 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.
CVE-2021-42703 1 Advantech 1 Webaccess Hmi Designer 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
This vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action.
CVE-2021-21911 2 Advantech, Microsoft 2 R-seenet, Windows 2024-02-04 7.2 HIGH 7.8 HIGH
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2021-21918 1 Advantech 1 R-seenet 2024-02-04 4.0 MEDIUM 4.9 MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack.
CVE-2021-40388 1 Advantech 1 Sq Manager 2024-02-04 7.2 HIGH 8.8 HIGH
A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2021-21915 1 Advantech 1 R-seenet 2024-02-04 6.5 MEDIUM 8.8 HIGH
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
CVE-2021-21932 1 Advantech 1 R-seenet 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘name_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.
CVE-2021-21936 1 Advantech 1 R-seenet 2024-02-04 6.5 MEDIUM 8.8 HIGH
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘health_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.
CVE-2021-21912 2 Advantech, Microsoft 2 R-seenet, Windows 2024-02-04 7.2 HIGH 7.8 HIGH
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.