Vulnerabilities (CVE)

Filtered by vendor Frauscher Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5500 1 Frauscher 1 Frauscher Diagnostic System 102 2024-02-28 N/A 8.8 HIGH
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
CVE-2023-4291 1 Frauscher 1 Frauscher Diagnostic System 101 2024-02-28 N/A 9.8 CRITICAL
Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE) vulnerability via manipulated parameters of the web interface without authentication. This could lead to a full compromise of the FDS101 device.
CVE-2023-4292 1 Frauscher 1 Frauscher Diagnostic System 101 2024-02-28 N/A 5.3 MEDIUM
Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a SQL injection vulnerability via manipulated parameters of the web interface without authentication. The database contains limited, non-critical log information.
CVE-2023-4152 1 Frauscher 1 Frauscher Diagnostic System 101 2024-02-28 N/A 7.5 HIGH
Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS101 device.
CVE-2023-2880 1 Frauscher 1 Frauscher Diagnostic System 101 2024-02-28 N/A 7.5 HIGH
Frauscher Sensortechnik GmbH FDS001 for FAdC/FAdCi v1.3.3 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS001 device.
CVE-2022-3575 1 Frauscher 1 Frauscher Diagnostic System 102 2024-02-28 N/A 9.8 CRITICAL
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.