Search Results (345450 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-38457 1 Auvesy 1 Versiondog 2024-11-21 9.8 Critical
The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.
CVE-2021-38456 1 Moxa 1 Mxview 2024-11-21 9.8 Critical
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
CVE-2021-38455 1 Auvesy 1 Versiondog 2024-11-21 7.3 High
The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.
CVE-2021-38454 1 Moxa 1 Mxview 2024-11-21 10 Critical
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
CVE-2021-38453 1 Auvesy 1 Versiondog 2024-11-21 9.1 Critical
Some API functions allow interaction with the registry, which includes reading values as well as data modification.
CVE-2021-38452 1 Moxa 1 Mxview 2024-11-21 7.5 High
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
CVE-2021-38451 1 Auvesy 1 Versiondog 2024-11-21 4.8 Medium
The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.
CVE-2021-38450 1 Trane 5 Tracer Concierge, Tracer Sc, Tracer Sc\+ and 2 more 2024-11-21 9.9 Critical
The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.
CVE-2021-38449 1 Auvesy 1 Versiondog 2024-11-21 9.8 Critical
Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.
CVE-2021-38448 1 Trane 6 Ascend Air-cooled Chiller Acr, Intellipak 1, Intellipak 2 and 3 more 2024-11-21 7.5 High
The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.
CVE-2021-38442 1 Fatek 1 Winproladder 2024-11-21 7.8 High
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-38440 1 Fatek 1 Winproladder 2024-11-21 3.3 Low
FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.
CVE-2021-38438 1 Fatek 1 Winproladder 2024-11-21 7.8 High
A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.
CVE-2021-38436 1 Fatek 1 Winproladder 2024-11-21 7.8 High
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2021-38434 1 Fatek 1 Winproladder 2024-11-21 7.8 High
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.
CVE-2021-38432 1 Fatek 2 Communication Server, Communication Server Firmware 2024-11-21 9.8 Critical
FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
CVE-2021-38431 1 Advantech 1 Webaccess Scada 2024-11-21 4.3 Medium
An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users.
CVE-2021-38430 1 Fatek 1 Winproladder 2024-11-21 7.8 High
FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.
CVE-2021-38428 1 Deltaww 1 Dialink 2024-11-21 5.5 Medium
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code.
CVE-2021-38426 1 Fatek 1 Winproladder 2024-11-21 7.8 High
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.