Orpak

Siteomat

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 14.51%
  • Veröffentlicht 03.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:38

A stack buffer overflow exists in one of the Orpak SiteOmat CGI components, allowing for remote code execution. The vulnerability affects all versions prior to 2017-09-25.

  • EPSS 10.78%
  • Veröffentlicht 03.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:24

An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and ...

  • EPSS 0.44%
  • Veröffentlicht 03.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:37

All known versions of the Orpak SiteOmat web management console is vulnerable to multiple instances of Stored Cross-site Scripting due to improper external user-input validation. An attacker with access to the web interface is able to hijack sessions...

  • EPSS 5.07%
  • Veröffentlicht 03.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:37

A SQL injection vulnerability exists in all Orpak SiteOmat versions prior to 2017-09-25. The vulnerability is in the login page, where the authentication validation process contains an insecure SELECT query. The attack allows for authentication bypas...

  • EPSS 0.71%
  • Veröffentlicht 03.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:38

An insecure communication was found between a user and the Orpak SiteOmat management console for all known versions, due to an invalid SSL certificate. The attack allows for an eavesdropper to capture the communication and decrypt the data.

  • EPSS 1.83%
  • Veröffentlicht 03.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:38

The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive vali...