Mbconnectline

Mymbconnect24

38 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Published 14.09.2022 14:15:12
  • Last modified 21.11.2024 06:46:56

A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2.

  • EPSS 0.27%
  • Published 27.10.2021 11:15:07
  • Last modified 21.11.2024 06:10:44

In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.

  • EPSS 0.27%
  • Published 02.08.2021 11:15:11
  • Last modified 21.11.2024 06:10:44

In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.

  • EPSS 0.23%
  • Published 02.08.2021 11:15:11
  • Last modified 21.11.2024 06:10:43

In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercept...

  • EPSS 0.18%
  • Published 02.03.2021 22:15:12
  • Last modified 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.

  • EPSS 0.19%
  • Published 02.03.2021 22:15:12
  • Last modified 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.

  • EPSS 0.22%
  • Published 02.03.2021 22:15:12
  • Last modified 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.

  • EPSS 0.15%
  • Published 02.03.2021 22:15:12
  • Last modified 21.11.2024 04:59:52

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without ha...

  • EPSS 0.8%
  • Published 16.02.2021 16:15:13
  • Last modified 21.11.2024 05:27:36

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing.

  • EPSS 0.29%
  • Published 16.02.2021 16:15:13
  • Last modified 21.11.2024 05:27:36

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page.