Show filters
325 Total Results
Displaying 81-90 of 325
Sort by:
Attacker Value
Unknown

CVE-2021-21919

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack.
Attacker Value
Unknown

CVE-2021-21918

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack.
Attacker Value
Unknown

CVE-2021-21917

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Attacker Value
Unknown

CVE-2021-21916

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Attacker Value
Unknown

CVE-2021-21915

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Attacker Value
Unknown

CVE-2021-21912

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-21911

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-21910

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-42703

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
This vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action.
Attacker Value
Unknown

CVE-2021-42706

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
This vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of WebAccess/MHI Designer