Page 6 of 39 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de escalada de privilegios en la versión de instalación de Windows para Advantech R-SeeNet Advantech R-SeeNet versión 2.4.15 (30.07.2021). Un archivo especialmente diseñado puede ser sustituido en el sistema para escalar privilegios a la autoridad NT SYSTEM. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 • CWE-269: Improper Privilege Management CWE-276: Incorrect Default Permissions •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de escalada de privilegios en la versión de Windows de la instalación de Advantech R-SeeNet versión 2.4.15 (30.07.2021). Un archivo especialmente diseñado puede ser sustituido en el sistema para escalar privilegios a la autoridad de NT SYSTEM. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 • CWE-276: Incorrect Default Permissions •