Page 8 of 39 results (0.005 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP request to trigger this vulnerability. Se presenta una vulnerabilidad de inclusión de archivos locales (LFI) en la funcionalidad del script del archivo options.php de Advantech R-SeeNet versión v 2.4.12 (20.10.2020). Una petición HTTP especialmente diseñada puede conllevar a una ejecución de código PHP arbitrario. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 9.6EPSS: 80%CPEs: 1EXPL: 1

Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability. Se presentan vulnerabilidades de tipo Cross-site scripting en la funcionalidad script del archivo ssh_form.php de Advantech R-SeeNet versión v 2.4.12 (20.10.2020). Si un usuario visita una URL especialmente diseñada, puede conllevar a una ejecución de código JavaScript arbitrario en el contexto del navegador del usuario objetivo. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.6EPSS: 80%CPEs: 1EXPL: 1

Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability. Se presentan vulnerabilidades de tipo Cross-site scripting en la funcionalidad script del archivo telnet_form.php de Advantech R-SeeNet versión v 2.4.12 (20.10.2020). Si un usuario visita una URL especialmente diseñada, puede conllevar a una ejecución de código JavaScript arbitrario en el contexto del navegador del usuario objetivo. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information. La página web de R-SeeNet (versiones 1.5.1 hasta 2.4.10) sufre de una inyección SQL, que permite a un atacante remoto invocar consultas en la base de datos y recuperar información confidencial This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech R-SeeNet. Authentication is not required to exploit this vulnerability. The specific flaw exists within device_position.php. When parsing the device_id parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. • https://us-cert.cisa.gov/ics/advisories/icsa-20-289-02 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •