Page 2 of 12 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal message broker system. This could allow an unauthenticated remote attacker to subscribe to arbitrary message queues. Se ha identificado una vulnerabilidad en SiPass integrated versiones V2.76 (Todas las versiones), SiPass integrated versiones V2.80 (Todas las versiones), SiPass integrated versiones V2.85 (Todas las versiones), Siveillance Identity versiones V1.5 (Todas las versiones), Siveillance Identity versiones V1.6 (Todas las versiones anteriores a V1.6.284.0). Las aplicaciones afectadas no limitan suficientemente el acceso al sistema interno del corredor de mensajes. • https://cert-portal.siemens.com/productcert/pdf/ssa-160202.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-463116.pdf • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 10.0EPSS: 96%CPEs: 398EXPL: 30

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. • https://github.com/fullhunt/log4j-scan https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words https://github.com/cyberstruggle/L4sh https://github.com/woodpecker-appstore/log4j-payload-generator https://github.com/tangxiaofeng7/apache-log4j-poc https://www.exploit-db.com/exploits/51183 https://www.exploit-db.com/exploits/50592 https://www.exploit-db.com/exploits/50590 https://github.com/logpresso/CVE-2021-44228-Scanner https://github.com/jas502n/Log4j2-CVE-2021-44228 h • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption CWE-502: Deserialization of Untrusted Data CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with access to a low-privileged user account to read or write files on the file system of the SiPass integrated server over the network. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante con acceso a una cuenta de usuario con pocos privilegios leyese o escribiese archivos en el sistema de archivos del servidor SiPass integrated en la red. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with network access to the SiPass integrated server to bypass the authentication mechanism and perform administrative operations. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante con acceso red al servidor SiPass integrated omitiese el mecanismo de autenticación y realizase operaciones administrativas. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-287: Improper Authentication •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker in a Man-in-the-Middle position between the SiPass integrated server and SiPass integrated clients to read or modify the network communication. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante en posición Man-in-the-Middle entre el servidor SiPass integrated y los clientes SiPass integrated leyese o modificase la comunicación de red. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-300: Channel Accessible by Non-Endpoint •