Логотип exploitDog
bind:CVE-2019-13922
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13922

Количество 3

Количество 3

nvd логотип

CVE-2019-13922

больше 6 лет назад

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 2.7
EPSS: Низкий
github логотип

GHSA-gr98-g82j-6qxx

больше 3 лет назад

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known.

EPSS: Низкий
fstec логотип

BDU:2020-01371

больше 6 лет назад

Уязвимость веб-интерфейса сервера Siemens SINEMA Remote Connect, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 2.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13922

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 2.7
0%
Низкий
больше 6 лет назад
github логотип
GHSA-gr98-g82j-6qxx

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01371

Уязвимость веб-интерфейса сервера Siemens SINEMA Remote Connect, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 2.7
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу