Advantech iView, Versions 5.7 and prior. The affected product is vulnerable to path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code.
Max CVSS
9.8
EPSS Score
11.32%
Published
2020-08-25
Updated
2020-08-31
Advantech iView, versions 5.6 and prior, is vulnerable to multiple path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code.
Max CVSS
9.8
EPSS Score
0.43%
Published
2020-07-15
Updated
2020-07-21
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.
Max CVSS
8.8
EPSS Score
0.52%
Published
2020-05-08
Updated
2021-09-23
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control.
Max CVSS
7.1
EPSS Score
0.13%
Published
2020-05-08
Updated
2021-09-23
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.
Max CVSS
9.8
EPSS Score
1.21%
Published
2020-05-08
Updated
2021-09-23
An attacker could use a specially crafted URL to delete or read files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
Max CVSS
9.8
EPSS Score
1.51%
Published
2020-04-09
Updated
2020-04-10
An attacker could use a specially crafted URL to delete files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
Max CVSS
9.1
EPSS Score
1.68%
Published
2020-04-09
Updated
2020-04-10
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!