Логотип exploitDog
bind:CVE-2024-39569
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-39569

Количество 3

Количество 3

nvd логотип

CVE-2024-39569

больше 1 года назад

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-h3fp-5w83-8rcj

больше 1 года назад

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CVSS3: 6.6
EPSS: Низкий
fstec логотип

BDU:2024-05607

больше 1 года назад

Уязвимость клиента VPN-сервиса SINEMA Remote Connect, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-39569

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CVSS3: 6.6
2%
Низкий
больше 1 года назад
github логотип
GHSA-h3fp-5w83-8rcj

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CVSS3: 6.6
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05607

Уязвимость клиента VPN-сервиса SINEMA Remote Connect, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
2%
Низкий
больше 1 года назад

Уязвимостей на страницу