CVE-2018-4861
- EPSS 0.42%
- Veröffentlicht 26.06.2018 18:29:01
- Zuletzt bearbeitet 21.11.2024 04:07:36
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could potentially read and download arbitrary files from the device's file system. Successful exploitati...
CVE-2018-11447
- EPSS 0.17%
- Veröffentlicht 26.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:43:23
A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation ...
CVE-2018-11448
- EPSS 0.22%
- Veröffentlicht 26.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:43:23
A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation ...
CVE-2018-11449
- EPSS 0.12%
- Veröffentlicht 26.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:43:23
A vulnerability has been identified in SCALANCE M875 (All versions). An attacker with access to the local file system might obtain passwords for administrative users. Successful exploitation requires read access to files on the local file system. A s...
- EPSS 1.12%
- Veröffentlicht 26.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:07:36
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker ha...
- EPSS 1.12%
- Veröffentlicht 26.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:07:36
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker ha...