Логотип exploitDog
bind:CVE-2015-1595
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-1595

Количество 2

Количество 2

nvd логотип

CVE-2015-1595

почти 11 лет назад

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-mvcj-93rq-55q5

больше 3 лет назад

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-1595

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

CVSS2: 4.3
0%
Низкий
почти 11 лет назад
github логотип
GHSA-mvcj-93rq-55q5

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу