cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-5642,https://securityvulnerability.io/vulnerability/CVE-2023-5642,Advantech R-SeeNet Unauthenticated Read/Write,"The Advantech R-SeeNet v2.4.23 software has a vulnerability that allows unauthenticated remote attackers to manipulate the snmpmon.ini file. This file contains critical sensitive information, leading to potential data exposure and unauthorized actions within the system.",Advantech,R-seenet,9.8,CRITICAL,0.004660000093281269,false,,false,false,false,,,false,false,,2023-10-18T16:15:00.000Z,0 CVE-2023-2611,https://securityvulnerability.io/vulnerability/CVE-2023-2611,Advantech R-SeeNet Use of Hard-coded Credentials,"Advantech R-SeeNet version 2.4.22 includes a hidden root-level user account that is not discernible in the active user list. This account possesses a password that cannot be modified by legitimate users, which poses significant access control issues and makes the system vulnerable to unauthorized access.",Advantech,R-seenet,9.8,CRITICAL,0.0018599999602884054,false,,false,false,false,,,false,false,,2023-06-22T17:15:00.000Z,0 CVE-2023-3256,https://securityvulnerability.io/vulnerability/CVE-2023-3256,Advantech R-SeeNet External Control of File Name or Path,The R-SeeNet version 2.4.22 by Advantech contains a vulnerability that permits low-level users to access and load local file contents. This could potentially expose sensitive information and compromise system integrity. It is crucial for organizations to assess their installation of R-SeeNet to protect against unauthorized file exposure and ensure the security of their information systems.,Advantech,R-seenet,8.8,HIGH,0.0017099999822676182,false,,false,false,false,,,false,false,,2023-06-22T17:15:00.000Z,0 CVE-2022-3387,https://securityvulnerability.io/vulnerability/CVE-2022-3387,Path Traversal Vulnerability in Advantech R-SeeNet Software,"Advantech R-SeeNet versions 2.4.19 and earlier are exposed to path traversal vulnerabilities, enabling remote attackers to exploit flawed PHP code. This security flaw could allow unauthorized access to the system, granting attackers the capability to delete critical .PDF files, potentially leading to data loss and operational disruptions.",Advantech,R-seenet,6.5,MEDIUM,0.0023399998899549246,false,,false,false,false,,,false,false,,2022-10-27T20:47:39.213Z,0 CVE-2022-3386,https://securityvulnerability.io/vulnerability/CVE-2022-3386,Stack-based Buffer Overflow in Advantech R-SeeNet Product,"Advantech R-SeeNet, specifically versions 2.4.17 and earlier, is susceptible to a stack-based buffer overflow. This vulnerability arises when an attacker utilizes an overly long filename, which can lead to an overflow of the stack buffer. By exploiting this flaw, unauthorized individuals could potentially execute arbitrary code on the affected system, thereby compromising its integrity and security. Organizations utilizing affected versions are urged to implement appropriate countermeasures.",Advantech,R-seenet,9.8,CRITICAL,0.003599999938160181,false,,false,false,false,,,false,false,,2022-10-27T20:34:44.584Z,0 CVE-2022-3385,https://securityvulnerability.io/vulnerability/CVE-2022-3385,Stack-Based Buffer Overflow in Advantech R-SeeNet Software,"The Advantech R-SeeNet software, specifically versions 2.4.17 and earlier, is susceptible to a stack-based buffer overflow. This vulnerability allows unauthorized attackers to remotely manipulate the stack buffer, potentially leading to remote code execution. Organizations using affected versions are recommended to update their software to mitigate risks associated with this security flaw.",Advantech,R-seenet,9.8,CRITICAL,0.003599999938160181,false,,false,false,false,,,false,false,,2022-10-27T20:16:37.877Z,0 CVE-2020-25157,https://securityvulnerability.io/vulnerability/CVE-2020-25157,SQL Injection Vulnerability in R-SeeNet Product by Cisa,"The R-SeeNet product versions 1.5.1 through 2.4.10 are susceptible to SQL injection attacks. This vulnerability enables remote attackers to manipulate database queries, which can lead to unauthorized access and retrieval of sensitive information from the affected database systems. Promptly patching these versions is essential to mitigate potential exploitation risks.",Advantech,Advantech R-seenet,7.5,HIGH,0.005849999841302633,false,,false,false,false,,,false,false,,2020-10-20T21:40:26.000Z,0