Mbconnectline

Mbconnect24

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 06.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:39:53

Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a l...

  • EPSS 0.03%
  • Veröffentlicht 06.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:38:14

An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the sa...

  • EPSS 0.3%
  • Veröffentlicht 14.09.2022 14:15:12
  • Zuletzt bearbeitet 21.11.2024 06:46:56

A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2.

  • EPSS 0.27%
  • Veröffentlicht 27.10.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:10:44

In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.

  • EPSS 0.3%
  • Veröffentlicht 02.08.2021 11:15:11
  • Zuletzt bearbeitet 21.11.2024 06:10:44

In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.

  • EPSS 0.26%
  • Veröffentlicht 02.08.2021 11:15:11
  • Zuletzt bearbeitet 21.11.2024 06:10:43

In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercept...

  • EPSS 0.15%
  • Veröffentlicht 02.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without ha...

  • EPSS 0.18%
  • Veröffentlicht 02.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.

  • EPSS 0.19%
  • Veröffentlicht 02.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.

  • EPSS 0.22%
  • Veröffentlicht 02.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.