Filtered by vendor Advantech
Subscriptions
Filtered by product Webaccess
Subscriptions
Total
103 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-7929 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The absolute path traversal vulnerability has been identified, which may allow an attacker to traverse the file system to access restricted files or directories. | ||||
CVE-2017-5175 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code. | ||||
CVE-2017-5154 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection vulnerability, an attacker must supply malformed input to the WebAccess software. Successful attack could result in administrative access to the application and its data files. | ||||
CVE-2017-5152 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An issue was discovered in Advantech WebAccess Version 8.1. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access pages unrestricted (AUTHENTICATION BYPASS). | ||||
CVE-2017-16753 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash. | ||||
CVE-2017-16736 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files. | ||||
CVE-2017-16732 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A use-after-free issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows an unauthenticated attacker to specify an arbitrary address. | ||||
CVE-2017-16728 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash. | ||||
CVE-2017-16724 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack. | ||||
CVE-2017-16720 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device. | ||||
CVE-2017-16716 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands. | ||||
CVE-2017-14016 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. The application lacks proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. | ||||
CVE-2017-12719 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A remote attacker is able to execute code to dereference a pointer within the program causing the application to become unavailable. | ||||
CVE-2017-12717 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application. | ||||
CVE-2017-12713 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Multiple files and folders with ACLs that affect other users are allowed to be modified by non-administrator accounts. | ||||
CVE-2017-12711 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges. | ||||
CVE-2017-12710 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information. | ||||
CVE-2017-12708 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash. | ||||
CVE-2017-12706 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. | ||||
CVE-2017-12704 | 1 Advantech | 1 Webaccess | 2024-11-21 | N/A |
A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. |