Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ecava integraxor vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2011-1562
Ecava IntegraXor HMI before n 3.60 (Build 4032) allows remote malicious users to bypass authentication and execute arbitrary SQL statements via unspecified vectors related to a crafted POST request. NOTE: some sources have reported this issue as SQL injection, but this might not ...
Ecava Integraxor
1 Github repository
445
VMScore
CVE-2017-16735
A SQL Injection issue exists in Ecava IntegraXor v 6.1.1030.1 and prior. The SQL Injection vulnerability has been identified, which generates an error in the database log.
Ecava Integraxor
570
VMScore
CVE-2016-2300
Ecava IntegraXor prior to 5.0 build 4522 allows remote malicious users to bypass authentication and access unspecified web pages via unknown vectors.
Ecava Integraxor
392
VMScore
CVE-2015-0990
Untrusted search path vulnerability in Ecava IntegraXor SCADA Server prior to 4.2.4488 allows local users to gain privileges via a renamed DLL in the default install directory.
Ecava Integraxor
614
VMScore
CVE-2010-4599
Untrusted search path vulnerability in Ecava IntegraXor 3.6.4000.0 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory. NOTE: the provenance of this information is unknown; the details are obtained solely from third party info...
Ecava Integraxor 3.6.4000.0
668
VMScore
CVE-2016-8341
An issue exists in Ecava IntegraXor Version 5.0.413.0. The Ecava IntegraXor web server has parameters that are vulnerable to SQL injection. If the queries are not sanitized, the host's database could be subject to read, write, and delete commands.
Ecava Integraxor 5.0.413.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3