33 results (0.009 seconds)

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 0

10 Dec 2024 — A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The PDMS/E3D Engineering Interface improperly handles XML External Entity (XXE) entries when communicating with an external application. This could allow an attacker to extract any file with a known location... • https://cert-portal.siemens.com/productcert/html/ssa-701627.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.7EPSS: 0%CPEs: 3EXPL: 0

10 Dec 2024 — A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The Generic Data Mapper, the Engineering Adapter, and the Engineering Interface improperly handle XML External Entity (XXE) entries when parsing configuration and mapping files. This could allow an attacker ... • https://cert-portal.siemens.com/productcert/html/ssa-701627.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2023 — A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to. Se ha identificado una vulnerabilidad en COMOS (todas las versiones). La aplicación afectada carece de controles de acceso adecuados para realizar la conexión a SQLServer. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-284: Improper Access Control •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2023 — A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to. Se ha identificado una vulnerabilidad en COMOS (todas las versiones). La aplicación afectada carece de controles de acceso adecuados en los recursos compartidos de SMB. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-284: Improper Access Control •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2023 — A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. Se ha identificado una vulnerabilidad en COMOS (Todas las versiones < V10.4.4). El ejecutable de Ptmcast utilizado para probar el servicio de validación de caché en... • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2023 — A vulnerability has been identified in COMOS (All versions < V10.4.4). Caching system in the affected application leaks sensitive information such as user and project information in cleartext via UDP. Se ha identificado una vulnerabilidad en COMOS (Todas las versiones &lt; V10.4.4). El sistema de almacenamiento en caché de la aplicación afectada filtra información confidencial, como información del usuario y del proyecto, en texto plano a través de UDP. • https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 10.0EPSS: 0%CPEs: 7EXPL: 0

14 Feb 2023 — A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This coul... • https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

09 Feb 2022 — A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS allows to upload and store arbitrary files at the webserver. This could allow an attacker to store malicious files. Se ha identificado una vulnerabilidad en COMOS V10.2 (Todas las versiones sólo si se utilizan componentes web), COMOS V10.... • https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

11 Jan 2022 — A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS uses a flawed implementation of CSRF prevention. An attacker could exploit this vulnerability to perform cross-site request forgery attacks. Se ha identificado una vulnerabilidad en COMOS V10.2 (Todas las versiones sólo si se utilizan com... • https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

11 Jan 2022 — A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS is vulnerable to SQL injections. This could allow an attacker to execute arbitrary SQL statements. Se ha identificado una vulnerabilidad en COMOS V10.2 (Todas las versiones sólo si se utilizan componentes web), COMOS V10.3 (Todas las vers... • https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •