Filtered by vendor Badgermeter
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-1301 | 1 Badgermeter | 1 Monitool | 2025-02-26 | 9.8 Critical |
SQL injection vulnerability in Badger Meter Monitool affecting versions 4.6.3 and earlier. A remote attacker could send a specially crafted SQL query to the server via the j_username parameter and retrieve the information stored in the database. | ||||
CVE-2024-1302 | 1 Badgermeter | 1 Monitool | 2025-02-26 | 7.3 High |
Information exposure vulnerability in Badger Meter Monitool affecting versions up to 4.6.3 and earlier. A local attacker could change the application's file parameter to a log file obtaining all sensitive information such as database credentials. | ||||
CVE-2024-1303 | 1 Badgermeter | 1 Monitool | 2025-02-26 | 6.5 Medium |
Incorrectly limiting the path to a restricted directory vulnerability in Badger Meter Monitool that affects versions up to 4.6.3 and earlier. This vulnerability allows an authenticated attacker to retrieve any file from the device using the download-file functionality. | ||||
CVE-2024-1304 | 1 Badgermeter | 1 Monitool | 2025-02-26 | 6.3 Medium |
Cross-site scripting vulnerability in Badger Meter Monitool that affects versions up to 4.6.3 and earlier. This vulnerability allows a remote attacker to send a specially crafted javascript payload to an authenticated user and partially hijack their browser session. | ||||
CVE-2020-12509 | 1 Badgermeter | 1 Moni\ | 2024-11-21 | 7.5 High |
In s::can moni::tools in versions below 4.2 an unauthenticated attacker could get any file from the device by path traversal in the camera-file module. | ||||
CVE-2020-12508 | 1 Badgermeter | 1 Moni\ | 2024-11-21 | 7.5 High |
In s::can moni::tools in versions below 4.2 an unauthenticated attacker could get any file from the device by path traversal in the image-relocator module. | ||||
CVE-2020-12507 | 1 Badgermeter | 1 Moni\ | 2024-11-21 | 8.8 High |
In s::can moni::tools before version 4.2 an authenticated attacker could get full access to the database through SQL injection. This may result in loss of confidentiality, loss of integrity and DoS. |
Page 1 of 1.