1.1.14-1243
2 years ago
2 years ago
Known vulnerabilities in the fuxa-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authorization in the scheduler endpoint. An attacker can gain unauthorized access to create, modify, or delete schedules by sending crafted requests to the server. This can result in forcing connected devices to specific states, values, or executing existing scripts remotely. How to fix Missing Authorization? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authentication for Critical Function in the How to fix Missing Authentication for Critical Function? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Insecure Default Initialization of Resource due to the use of a hardcoded JWT secret in the default configuration. An attacker can gain administrative access and execute arbitrary code by forging authentication tokens and interacting with administrative APIs. How to fix Insecure Default Initialization of Resource? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the How to fix Missing Authentication for Critical Function? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Improper Authentication via the authentication process. An attacker can gain administrative access and execute arbitrary code by bypassing authentication mechanisms and interacting with administrative APIs. Note: This is only exploitable if How to fix Improper Authentication? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authorization via the WebSocket. An attacker can overwrite arbitrary device tags or disable communication drivers by sending crafted WebSocket messages without authentication. Note: This is only exploitable if the deployment is configured with How to fix Missing Authorization? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information via How to fix Cleartext Storage of Sensitive Information? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Command Injection via the project files import proccess. An attacker can execute arbitrary system commands by uploading a crafted project file containing malicious scripts. How to fix Command Injection? A fix was pushed into the | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Use of Hard-coded Credentials via the How to fix Use of Hard-coded Credentials? There is no fixed version for | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authentication for Critical Function due to the How to fix Missing Authentication for Critical Function? There is no fixed version for | * |
fuxa-server is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the How to fix Missing Authentication for Critical Function? There is no fixed version for | * |