Lucene search

K
RockwellautomationPavilion8

5 matches found

CVE
CVE
added 2024/07/16 1:15 p.m.43 views

CVE-2024-6435

A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For ...

8.8CVSS6.4AI score0.00051EPSS
CVE
CVE
added 2024/09/12 9:15 p.m.42 views

CVE-2024-7961

A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.

9.8CVSS9.8AI score0.00972EPSS
CVE
CVE
added 2024/09/12 9:15 p.m.41 views

CVE-2024-7960

The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.

9.1CVSS9.1AI score0.00175EPSS
CVE
CVE
added 2024/08/14 8:15 p.m.40 views

CVE-2024-40620

CVE-2024-40620 IMPACT A vulnerability exists in the affected product due to lack of encryption of sensitive information. The vulnerability results in data being sent between the Console and the Dashboard without encryption, which can be seen in the logs of proxy servers, potentially impacting the d...

7.5CVSS6.4AI score0.00038EPSS
CVE
CVE
added 2023/09/12 5:15 p.m.33 views

CVE-2023-29463

The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.

8.8CVSS5.9AI score0.00034EPSS