📦 R Seenet
by Advantech
🔍 What is R Seenet?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows unauthenticated remote attackers to read and write to the snmpmon.ini configuration file in Advantech R-SeeNet software. Attackers can access sensitive information or modify ...
This CVE describes a critical OS command injection vulnerability in Advantech R-SeeNet's ping.php script that allows unauthenticated attackers to execute arbitrary operating system commands on affecte...
This CVE describes a local file inclusion vulnerability in Advantech R-SeeNet's options.php script that allows attackers to execute arbitrary PHP code via crafted HTTP requests. Organizations using Ad...
CVE-2023-3256 is a local file inclusion vulnerability in Advantech R-SeeNet versions 2.4.22 that allows low-privileged users to access and load local files. This affects organizations using Advantech ...
This vulnerability allows local attackers to escalate privileges to SYSTEM authority on Windows systems running Advantech R-SeeNet 2.4.15 by replacing system files with malicious ones. It affects orga...
An authenticated SQL injection vulnerability exists in Advantech R-SeeNet's group_list page via the company_filter parameter. This allows attackers to execute arbitrary SQL commands, potentially compr...
An authenticated SQL injection vulnerability exists in Advantech R-SeeNet's group_list page, allowing attackers to execute arbitrary SQL commands. This affects R-SeeNet 2.4.15 installations as of July...
This SQL injection vulnerability allows authenticated users or attackers via CSRF to execute arbitrary SQL commands through the 'health_alt_filter' parameter. Successful exploitation could lead to dat...