Siemens

Sinema Remote Connect Server

69 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 14.09.2021 11:15:26
  • Last modified 23.04.2025 20:15:30

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve a list of network devices a known user can manag...

  • EPSS 0.1%
  • Published 14.09.2021 11:15:26
  • Last modified 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could brute force the usernames from the affected software.

  • EPSS 0.1%
  • Published 14.09.2021 11:15:26
  • Last modified 23.04.2025 20:15:30

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could manipulate certain parameters and set a valid user of the affected software as...

  • EPSS 0.08%
  • Published 14.09.2021 11:15:25
  • Last modified 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve VPN connection for a known user.

  • EPSS 0.13%
  • Published 14.09.2021 11:15:25
  • Last modified 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software allows sending send-to-sleep notifications to the managed devices. An unauthenticated attacker in the same network of the affected sy...

  • EPSS 0.1%
  • Published 14.09.2021 11:15:25
  • Last modified 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The status provided by the syslog clients managed by the affected software can be manipulated by an unauthenticated attacker in the same network of the aff...

Exploit
  • EPSS 0.38%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be ...

Exploit
  • EPSS 0.75%
  • Published 05.08.2021 21:15:11
  • Last modified 09.06.2025 15:15:24

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...

Exploit
  • EPSS 8.53%
  • Published 16.06.2021 12:15:12
  • Last modified 21.11.2024 05:45:54

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.

  • EPSS 0.34%
  • Published 15.03.2021 17:15:20
  • Last modified 21.11.2024 05:17:44

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). Unpriviledged users can access services when guessing the url. An attacker could impact availability, integrity and gain information from logs and templates of...