Solarwinds

Kiwi Syslog Server

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 29.10.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:07

A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable ...

  • EPSS 0.99%
  • Veröffentlicht 27.10.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:06

The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request t...

  • EPSS 2.39%
  • Veröffentlicht 27.10.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:07

The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. ...

  • EPSS 0.5%
  • Veröffentlicht 27.10.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:07

The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect th...

  • EPSS 0.37%
  • Veröffentlicht 25.10.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:06

As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example...