Show filters
89 Total Results
Displaying 31-40 of 89
Sort by:
Attacker Value
Unknown

CVE-2022-3270

Disclosure Date: December 01, 2022 (last updated February 24, 2025)
In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
Attacker Value
Unknown

CVE-2022-3480

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.
Attacker Value
Unknown

CVE-2022-33321

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed…
Attacker Value
Unknown

CVE-2022-33322

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.
Attacker Value
Unknown

CVE-2021-22650

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution.
Attacker Value
Unknown

CVE-2021-22648

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.
Attacker Value
Unknown

CVE-2021-22646

Disclosure Date: July 28, 2022 (last updated October 08, 2023)
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
Attacker Value
Unknown

CVE-2021-22644

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox TWinSoft uses the custom hardcoded user “TWinSoft” with a hardcoded key.
Attacker Value
Unknown

CVE-2021-22642

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
An attacker could use specially crafted invalid Modbus frames to crash the Ovarro TBox system.
Attacker Value
Unknown

CVE-2021-22640

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.