Advantech R-SeeNet 2.4.12

CPE Details

Advantech R-SeeNet 2.4.12
2.4.12
2021-07-17
01h05 +00:00
2021-08-05
10h17 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:*

Informations

Vendor

advantech

Product

r-seenet

Version

2.4.12

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-2611 2023-06-22 16h22 +00:00 Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users.
9.8
Critical
CVE-2023-3256 2023-06-22 16h21 +00:00 Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.
8.8
High
CVE-2022-3387 2022-10-27 20h47 +00:00 Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files.
6.5
Medium
CVE-2022-3386 2022-10-27 20h34 +00:00 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.
9.8
Critical
CVE-2022-3385 2022-10-27 20h16 +00:00 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.
9.8
Critical
CVE-2021-21805 2021-08-05 18h03 +00:00 An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
9.8
Critical
CVE-2021-21803 2021-07-16 08h37 +00:00 This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.
6.1
Medium
CVE-2021-21802 2021-07-16 08h37 +00:00 This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.
6.1
Medium
CVE-2021-21801 2021-07-16 08h37 +00:00 This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.
6.1
Medium
CVE-2021-21804 2021-07-16 08h34 +00:00 A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
9.8
Critical
CVE-2021-21800 2021-07-16 08h33 +00:00 Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability.
6.1
Medium
CVE-2021-21799 2021-07-16 08h33 +00:00 Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability.
6.1
Medium