Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mbconnect24
(Mbconnectline)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 32 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-08-02 | CVE-2021-34574 | In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 4.3 | ||
2020-04-14 | CVE-2020-10382 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler. | Mbconnect24, Mymbconnect24 | 8.8 | ||
2020-04-14 | CVE-2020-10383 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module. | Mbconnect24, Mymbconnect24 | 9.8 | ||
2020-04-14 | CVE-2020-10381 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names. | Mbconnect24, Mymbconnect24 | 5.3 | ||
2022-09-14 | CVE-2022-22520 | A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-10-27 | CVE-2021-34580 | In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2021-08-02 | CVE-2021-34575 | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2020-09-30 | CVE-2020-24570 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a CSRF issue (with resultant SSRF) in the com_mb24proxy module, allowing attackers to steal session information from logged-in users with a crafted link. | Mbconnect24, Mymbconnect24 | 6.5 | ||
2021-03-02 | CVE-2020-12530 | An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter. | Mbconnect24, Mymbconnect24 | 6.1 | ||
2021-03-02 | CVE-2020-12529 | An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports. | Mbconnect24, Mymbconnect24 | 5.3 |