Show filters
51 Total Results
Displaying 11-20 of 51
Sort by:
Attacker Value
Unknown

CVE-2021-3942

Disclosure Date: December 12, 2022 (last updated October 08, 2023)
Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution or LLMNR.
Attacker Value
Unknown

CVE-2021-27428

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.
Attacker Value
Unknown

CVE-2021-27426

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR IED firmware versions prior to version 8.1x with “Basic” security variant does not allow the disabling of the “Factory Mode,” which is used for servicing the IED by a “Factory” user.
Attacker Value
Unknown

CVE-2021-27424

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressed” MODBUS register can be used to gain unauthorized information.
Attacker Value
Unknown

CVE-2021-27422

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.
Attacker Value
Unknown

CVE-2021-27420

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.
Attacker Value
Unknown

CVE-2021-27418

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.
Attacker Value
Unknown

CVE-2021-41543

Disclosure Date: March 08, 2022 (last updated February 23, 2025)
A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The handling of log files in the web application of affected devices contains an information disclosure vulnerability which could allow logged in users to access sensitive files.
Attacker Value
Unknown

CVE-2021-41542

Disclosure Date: March 08, 2022 (last updated February 23, 2025)
A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The User Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action.
Attacker Value
Unknown

CVE-2021-41541

Disclosure Date: March 08, 2022 (last updated February 23, 2025)
A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The Group Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action.