U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 9 matching records.
Displaying matches 1 through 9.
Vuln ID Summary CVSS Severity
CVE-2013-6128

The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack.

Published: October 25, 2013; 4:55:03 PM -0400
V3.x:(not available)
V2.0: 5.8 MEDIUM
CVE-2013-6127

The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack.

Published: October 25, 2013; 4:55:03 PM -0400
V3.x:(not available)
V2.0: 5.8 MEDIUM
CVE-2012-4711

Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.

Published: February 15, 2013; 7:09:27 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2012-4899

WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file.

Published: October 10, 2012; 2:55:05 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2012-2560

Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001.

Published: July 04, 2012; 11:23:18 PM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2012-1832

WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001.

Published: July 04, 2012; 11:23:18 PM -0400
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2012-1831

Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.

Published: July 04, 2012; 11:23:18 PM -0400
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2012-1830

Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.

Published: July 04, 2012; 11:23:18 PM -0400
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-3142

Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method.

Published: August 16, 2011; 5:55:01 PM -0400
V3.x:(not available)
V2.0: 10.0 HIGH