CVE-2022-3385 – Advantech R-SeeNet show_code Endpoint Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-3385
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution. Las versiones 2.4.17 y anteriores de Advantech R-SeeNet son vulnerables a un Desbordamiento del Búfer. Un atacante no autorizado puede desbordar el Búfer de forma remota y permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech R-SeeNet. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2021-21937
https://notcve.org/view.php?id=CVE-2021-21937
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "host_alt_filter". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-21936
https://notcve.org/view.php?id=CVE-2021-21936
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘health_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "health_alt_filter". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-21935
https://notcve.org/view.php?id=CVE-2021-21935
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter2’ parameter. This can be done as any authenticated user or through cross-site request forgery. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "host_alt_filter2". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-21934
https://notcve.org/view.php?id=CVE-2021-21934
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘imei_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para provocar esto en el parámetro "imei_filter". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •