Siemens

Sinema Remote Connect Server

71 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung
  • EPSS 94.43%
  • Veröffentlicht 16.09.2021 15:15:07
  • Zuletzt bearbeitet 27.10.2025 17:37:06

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

  • EPSS 11.69%
  • Veröffentlicht 16.09.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:11:13

Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.

  • EPSS 0.1%
  • Veröffentlicht 14.09.2021 11:15:26
  • Zuletzt bearbeitet 23.04.2025 20:15:30

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could manipulate certain parameters and set a valid user of the affected software as...

  • EPSS 0.1%
  • Veröffentlicht 14.09.2021 11:15:26
  • Zuletzt bearbeitet 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could brute force the usernames from the affected software.

  • EPSS 0.08%
  • Veröffentlicht 14.09.2021 11:15:26
  • Zuletzt bearbeitet 23.04.2025 20:15:30

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve a list of network devices a known user can manag...

  • EPSS 0.08%
  • Veröffentlicht 14.09.2021 11:15:25
  • Zuletzt bearbeitet 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve VPN connection for a known user.

  • EPSS 0.13%
  • Veröffentlicht 14.09.2021 11:15:25
  • Zuletzt bearbeitet 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software allows sending send-to-sleep notifications to the managed devices. An unauthenticated attacker in the same network of the affected sy...

  • EPSS 0.1%
  • Veröffentlicht 14.09.2021 11:15:25
  • Zuletzt bearbeitet 23.04.2025 20:15:29

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The status provided by the syslog clients managed by the affected software can be manipulated by an unauthenticated attacker in the same network of the aff...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:55

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be ...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 09.06.2025 15:15:24

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...