Page 6 of 40 results (0.003 seconds)

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "name_filter". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de escalada de privilegios en la versión de Windows de la instalación de Advantech R-SeeNet versión 2.4.15 (30.07.2021). Un archivo especialmente diseñado puede ser sustituido en el sistema para escalar privilegios a la autoridad de NT SYSTEM. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 • CWE-276: Incorrect Default Permissions •