Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
osisoft vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-7500
A Permissions, Privileges, and Access Controls issue exists in OSIsoft PI Web API versions 2017 R2 and prior. Privileges may be escalated, giving attackers access to the PI System via the service account.
Osisoft Pi Web Api 2017
Osisoft Pi Web Api
Osisoft Pi Vision 2017
9.8
CVSSv3
CVE-2017-9653
An Improper Authorization issue exists in OSIsoft PI Integrator for Business Analytics prior to 2016 R2, PI Integrator for Microsoft Azure prior to 2016 R2 SP1, and PI Integrator for SAP HANA prior to 2017. An attacker is able to gain privileged access to the system while unautho...
Osisoft Pi Integrator For Business Analystics 2016
Osisoft Pi Integrator For Microsoft Azure 2016
Osisoft Pi Integrator For Sap Hana 2016
9
CVSSv3
CVE-2020-12021
In OSIsoft PI Web API 2019 Patch 1 (1.12.0.6346) and all previous versions, the affected product is vulnerable to a cross-site scripting attack, which may allow an malicious user to remotely execute arbitrary code.
Osisoft Pi Web Api 2019
Osisoft Pi Web Api
8.8
CVSSv3
CVE-2019-18271
OSIsoft PI Vision, All versions of PI Vision before 2019. The affected product is vulnerable to a cross-site request forgery that may be introduced on the PI Vision administration site.
Osisoft Pi Vision
8.8
CVSSv3
CVE-2019-13516
In OSIsoft PI Web API and prior, the affected product is vulnerable to a direct attack due to a cross-site request forgery protection setting that has not taken effect.
Osisoft Pi Web Api
8.8
CVSSv3
CVE-2017-9641
PI Coresight 2016 R2 contains a cross-site request forgery vulnerability that may allow access to the PI system. OSIsoft recommends that users upgrade to PI Vision 2017 or greater to mitigate this vulnerability.
Osisoft Pi Coresight
8.8
CVSSv3
CVE-2017-7926
A Cross-Site Request Forgery issue exists in OSIsoft PI Web API versions before 2017 (1.9.0). The vulnerability allows cross-site request forgery (CSRF) attacks to occur when an otherwise-unauthorized cross-site request is sent from a browser the server has previously authenticat...
Osisoft Pi Web Api 1.8
7.8
CVSSv3
CVE-2020-10606
In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI Syste...
Osisoft Pi Buffer Subsystem
Osisoft Pi Api
Osisoft Pi Connector
Osisoft Pi Connector Relay
Osisoft Pi Interface Configuration Utility
Osisoft Pi Integrator
Osisoft Pi Data Collection Manager
Osisoft Pi Data Archive
Osisoft Pi To Ocs
7.8
CVSSv3
CVE-2020-10608
In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in un...
Osisoft Pi Buffer Subsystem
Osisoft Pi Api
Osisoft Pi Connector
Osisoft Pi Connector Relay
Osisoft Pi Interface Configuration Utility
Osisoft Pi Integrator
Osisoft Pi Data Collection Manager
Osisoft Pi Data Archive
Osisoft Pi To Ocs
7.8
CVSSv3
CVE-2020-10610
In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, ...
Osisoft Pi Buffer Subsystem
Osisoft Pi Api
Osisoft Pi Connector
Osisoft Pi Connector Relay
Osisoft Pi Interface Configuration Utility
Osisoft Pi Integrator
Osisoft Pi Data Collection Manager
Osisoft Pi Data Archive
Osisoft Pi To Ocs
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »