Siemens

Sinec Ins

37 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 05.07.2022 11:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:18

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't writte...

  • EPSS 25.23%
  • Veröffentlicht 21.06.2022 15:15:09
  • Zuletzt bearbeitet 15.09.2025 14:15:33

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...

  • EPSS 0.09%
  • Veröffentlicht 23.03.2022 13:15:07
  • Zuletzt bearbeitet 21.11.2024 05:54:34

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also be...

  • EPSS 0.01%
  • Veröffentlicht 23.03.2022 11:15:08
  • Zuletzt bearbeitet 21.11.2024 06:38:32

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, eve...

  • EPSS 0.3%
  • Veröffentlicht 28.01.2022 22:15:15
  • Zuletzt bearbeitet 21.11.2024 06:37:02

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlik...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 16.01.2022 17:15:07
  • Zuletzt bearbeitet 21.11.2024 06:38:12

node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor

Exploit
  • EPSS 0.98%
  • Veröffentlicht 10.01.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:38:01

follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor

Exploit
  • EPSS 0.35%
  • Veröffentlicht 23.09.2021 13:15:08
  • Zuletzt bearbeitet 09.06.2025 15:15:25

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Exploit
  • EPSS 8.92%
  • Veröffentlicht 31.08.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:19

axios is vulnerable to Inefficient Regular Expression Complexity

Exploit
  • EPSS 0.41%
  • Veröffentlicht 26.05.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 05:54:34

In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspecti...