Vulnerabilities (CVE)

Filtered by vendor Proges Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-3082 1 Proges 2 Sensor Net Connect Firmware V2, Sensor Net Connect V2 2024-09-30 N/A 4.6 MEDIUM
A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled.
CVE-2024-31203 1 Proges 1 Thermoscan Ip 2024-09-30 N/A 5.5 MEDIUM
A “CWE-121: Stack-based Buffer Overflow” in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component.
CVE-2024-31202 1 Proges 1 Thermoscan Ip 2024-09-30 N/A 7.8 HIGH
A “CWE-732: Incorrect Permission Assignment for Critical Resource” in the ThermoscanIP installation folder allows a local attacker to perform a Local Privilege Escalation.
CVE-2024-3083 1 Proges 2 Sensor Net Connect Firmware V2, Sensor Net Connect V2 2024-09-30 N/A 8.3 HIGH
A “CWE-352: Cross-Site Request Forgery (CSRF)” can be exploited by remote attackers to perform state-changing operations with administrative privileges by luring authenticated victims into visiting a malicious web page.
CVE-2024-31199 1 Proges 2 Sensor Net Connect Firmware V2, Sensor Net Connect V2 2024-09-30 N/A 6.1 MEDIUM
A “CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')” allows malicious users to permanently inject arbitrary Javascript code.
CVE-2024-31201 1 Proges 1 Thermoscan Ip 2024-08-12 N/A 6.7 MEDIUM
A “CWE-428: Unquoted Search Path or Element” affects the ThermoscanIP_Scrutation service. Such misconfiguration could be abused in scenarios where incorrect permissions were assigned to the C:\ path to attempt a privilege escalation on the local machine.
CVE-2024-31200 1 Proges 2 Sensor Net Connect Firmware V2, Sensor Net Connect V2 2024-08-12 N/A 4.6 MEDIUM
A “CWE-201: Insertion of Sensitive Information Into Sent Data” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser.