Siemens

Sinema Remote Connect Client

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 12.08.2025 11:16:56
  • Zuletzt bearbeitet 12.08.2025 14:25:33

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

  • EPSS 0.03%
  • Veröffentlicht 10.09.2024 10:15:12
  • Zuletzt bearbeitet 10.09.2024 18:54:58

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application inserts sensitive information into a log file which is readable by all legitimate users of the underlying system. This could allow...

  • EPSS 0.12%
  • Veröffentlicht 10.09.2024 10:15:09
  • Zuletzt bearbeitet 20.08.2025 19:24:51

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.

  • EPSS 0.31%
  • Veröffentlicht 09.07.2024 12:15:16
  • Zuletzt bearbeitet 21.08.2025 00:54:46

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations....

  • EPSS 0.24%
  • Veröffentlicht 09.07.2024 12:15:16
  • Zuletzt bearbeitet 21.11.2024 09:28:01

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading proxy configuration...

  • EPSS 2.83%
  • Veröffentlicht 09.07.2024 12:15:16
  • Zuletzt bearbeitet 21.11.2024 09:28:02

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations....

  • EPSS 0.33%
  • Veröffentlicht 12.03.2024 11:15:49
  • Zuletzt bearbeitet 21.11.2024 08:55:27

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.1 SP1). The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to th...

  • EPSS 1.42%
  • Veröffentlicht 06.02.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:32

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subjec...

Exploit
  • EPSS 26.44%
  • Veröffentlicht 06.02.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:36

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents...