Show filters
140 Total Results
Displaying 81-90 of 140
Sort by:
Attacker Value
Unknown

CVE-2021-37163

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus operated by released versions of software before Nexus Software 7.2.5.7. The device has two user accounts with passwords that are hardcoded.
Attacker Value
Unknown

CVE-2021-37166

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
A buffer overflow issue leading to denial of service was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When HMI3 starts up, it binds a local service to a TCP port on all interfaces of the device, and takes extensive time for the GUI to connect to the TCP socket, allowing the connection to be hijacked by an external attacker.
Attacker Value
Unknown

CVE-2021-37162

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. If an attacker sends a malformed UDP message, a buffer underflow occurs, leading to an out-of-bounds copy and possible remote code execution.
Attacker Value
Unknown

CVE-2021-37165

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through the pendingQ, and may lead to remote code execution.
Attacker Value
Unknown

CVE-2021-29242

Disclosure Date: May 03, 2021 (last updated February 22, 2025)
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Attacker Value
Unknown

CVE-2021-30462

Disclosure Date: April 08, 2021 (last updated February 22, 2025)
VestaCP through 0.9.8-24 allows the admin user to escalate privileges to root because the Sudo configuration does not require a password to run /usr/local/vesta/bin scripts.
Attacker Value
Unknown

CVE-2021-30463

Disclosure Date: April 08, 2021 (last updated February 22, 2025)
VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
Attacker Value
Unknown

CVE-2021-28379

Disclosure Date: March 15, 2021 (last updated February 22, 2025)
web/upload/UploadHandler.php in Vesta Control Panel (aka VestaCP) through 0.9.8-27 and myVesta through 0.9.8-26-39 allows uploads from a different origin.
Attacker Value
Unknown

CVE-2021-27231

Disclosure Date: February 16, 2021 (last updated November 28, 2024)
Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email messages.
Attacker Value
Unknown

CVE-2020-15806

Disclosure Date: July 22, 2020 (last updated February 21, 2025)
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.