CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
101973 | CVE-2017-5153 | Candidate | An issue was discovered in OSIsoft PI Coresight 2016 R2 and earlier versions, and PI Web API 2016 R2 when deployed using the PI AF Services 2016 R2 integrated install kit. An information exposure through server log files vulnerability has been identified, which may allow service account passwords to become exposed for the affected services, potentially leading to unauthorized shutdown of the affected PI services as well as potential reuse of domain credentials. | Assigned (20170103) | None (candidate not yet proposed) | View | |
101974 | CVE-2017-5154 | Candidate | An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection vulnerability, an attacker must supply malformed input to the WebAccess software. Successful attack could result in administrative access to the application and its data files. | Assigned (20170103) | None (candidate not yet proposed) | View | |
101975 | CVE-2017-5155 | Candidate | An issue was discovered in Schneider Electric Wonderware Historian 2014 R2 SP1 P01 and earlier. Wonderware Historian creates logins with default passwords, which can allow a malicious entity to compromise Historian databases. In some installation scenarios, resources beyond those created by Wonderware Historian may be compromised as well. | Assigned (20170103) | None (candidate not yet proposed) | View | |
101976 | CVE-2017-5156 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20170103) | None (candidate not yet proposed) | View | |
101977 | CVE-2017-5157 | Candidate | An issue was discovered in Schneider Electric homeLYnk Controller, LSS100100, all versions prior to V1.5.0. The homeLYnk controller is susceptible to a cross-site scripting attack. User inputs can be manipulated to cause execution of JavaScript code. | Assigned (20170103) | None (candidate not yet proposed) | View |
Page 19753 of 20943, showing 5 records out of 104715 total, starting on record 98761, ending on 98765