Tracer Sc
by Track\+
CVEs (9)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-4526 | Hig | 0.49 | 7.5 | 0.00 | Sep 19, 2016 | ABB DataManagerPro 1.x before 1.7.1 allows local users to gain privileges by replacing a DLL file in the package directory. | |
| CVE-2016-0870 | Med | 0.34 | 5.3 | 0.01 | Sep 19, 2016 | The web server in Trane Tracer SC 4.2.1134 and earlier allows remote attackers to read sensitive configuration files via a direct request. | |
| CVE-2026-28256 | 0.00 | — | 0.00 | Mar 12, 2026 | A Use of Hard-coded, Security-relevant Constants vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts. | ||
| CVE-2026-28255 | 0.00 | — | 0.00 | Mar 12, 2026 | A Use of Hard-coded Credentials vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts. | ||
| CVE-2026-28254 | 0.00 | — | 0.00 | Mar 12, 2026 | A Missing Authorization vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to access sensitive information through unprotected APIs. | ||
| CVE-2026-28253 | 0.00 | — | 0.00 | Mar 12, 2026 | A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to cause a denial-of-service condition | ||
| CVE-2026-28252 | 0.00 | — | 0.00 | Mar 12, 2026 | A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device. | ||
| CVE-2021-38450 | 0.00 | — | 0.00 | Oct 27, 2021 | The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software. | ||
| CVE-2021-42534 | 0.00 | — | 0.00 | Oct 22, 2021 | The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms. |