31 results (0.003 seconds)

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to. Se ha identificado una vulnerabilidad en COMOS (todas las versiones). La aplicación afectada carece de controles de acceso adecuados para realizar la conexión a SQLServer. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-284: Improper Access Control •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to. Se ha identificado una vulnerabilidad en COMOS (todas las versiones). La aplicación afectada carece de controles de acceso adecuados en los recursos compartidos de SMB. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. Se ha identificado una vulnerabilidad en COMOS (Todas las versiones &lt; V10.4.4). El ejecutable de Ptmcast utilizado para probar el servicio de validación de caché en la aplicación afectada es vulnerable al desbordamiento del búfer basado en Structured Exception Handler (SEH). • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in COMOS (All versions < V10.4.4). Caching system in the affected application leaks sensitive information such as user and project information in cleartext via UDP. Se ha identificado una vulnerabilidad en COMOS (Todas las versiones &lt; V10.4.4). El sistema de almacenamiento en caché de la aplicación afectada filtra información confidencial, como información del usuario y del proyecto, en texto plano a través de UDP. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 10.0EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. • https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •