Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ecava integraxor vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2016-2305
Cross-site scripting (XSS) vulnerability in Ecava IntegraXor prior to 5.0 build 4522 allows remote malicious users to inject arbitrary web script or HTML via a crafted URL.
Ecava Integraxor
7.8
CVSSv2
CVE-2016-2306
The HMI web server in Ecava IntegraXor prior to 5.0 build 4522 allows remote malicious users to obtain sensitive cleartext information by sniffing the network.
Ecava Integraxor
5
CVSSv2
CVE-2017-16733
A SQL Injection issue exists in Ecava IntegraXor v 6.1.1030.1 and prior. The SQL Injection vulnerability has been identified, which an attacker can leverage to disclose sensitive information from the database.
Ecava Integraxor
7.5
CVSSv2
CVE-2017-6050
A SQL Injection issue exists in Ecava IntegraXor Versions 5.2.1231.0 and prior. The application fails to properly validate user input, which may allow for an unauthenticated malicious user to remotely execute arbitrary code in the form of SQL queries.
Ecava Integraxor
7.5
CVSSv2
CVE-2016-8341
An issue exists in Ecava IntegraXor Version 5.0.413.0. The Ecava IntegraXor web server has parameters that are vulnerable to SQL injection. If the queries are not sanitized, the host's database could be subject to read, write, and delete commands.
Ecava Integraxor 5.0.413.0
6.9
CVSSv2
CVE-2010-4599
Untrusted search path vulnerability in Ecava IntegraXor 3.6.4000.0 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory. NOTE: the provenance of this information is unknown; the details are obtained solely from third party info...
Ecava Integraxor 3.6.4000.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3