Filtered by vendor Sewio
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-47917 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-26 | N/A | 6.5 MEDIUM |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to several modules and services of the software. This could allow an attacker to delete arbitrary files and cause a denial-of-service condition. | |||||
CVE-2022-47395 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-26 | N/A | 8.1 HIGH |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site request forgery in its monitor services. An attacker could take advantage of this vulnerability to execute arbitrary maintenance operations and cause a denial-of-service condition. | |||||
CVE-2022-47911 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-26 | N/A | 7.2 HIGH |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not properly validate the input module name to the backup services of the software. This could allow a remote attacker to access sensitive functions of the application and execute arbitrary system commands. | |||||
CVE-2022-46733 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-26 | N/A | 9.6 CRITICAL |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site scripting in its backup services. An attacker could take advantage of this vulnerability to execute arbitrary commands. | |||||
CVE-2022-45444 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-26 | N/A | 9.8 CRITICAL |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote attacker to login to the database with unrestricted access. | |||||
CVE-2022-45127 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-25 | N/A | 8.1 HIGH |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site request forgery in its backup services. An attacker could take advantage of this vulnerability to execute arbitrary backup operations and cause a denial-of-service condition. | |||||
CVE-2022-43483 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-25 | N/A | 7.2 HIGH |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not properly validate the input module name to the monitor services of the software. This could allow a remote attacker to access sensitive functions of the application and execute arbitrary system commands. | |||||
CVE-2022-43455 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-25 | N/A | 6.5 MEDIUM |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to the service_start, service_stop, and service_restart modules of the software. This could allow an attacker to start, stop, or restart arbitrary services running on the server. | |||||
CVE-2022-41989 | 1 Sewio | 1 Real-time Location System Studio | 2023-01-25 | N/A | 9.8 CRITICAL |
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution. |