Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mymbconnect24
(Mbconnectline)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 32 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-16 | CVE-2020-35557 | An issue in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 allows a logged in user to see devices in the account he should not have access to due to improper use of access validation. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 6.5 | ||
2021-03-02 | CVE-2020-12527 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 6.5 | ||
2021-08-02 | CVE-2021-34574 | In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 4.3 | ||
2020-04-14 | CVE-2020-10382 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler. | Mbconnect24, Mymbconnect24 | 8.8 | ||
2020-04-14 | CVE-2020-10383 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module. | Mbconnect24, Mymbconnect24 | 9.8 | ||
2020-04-14 | CVE-2020-10381 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names. | Mbconnect24, Mymbconnect24 | 5.3 | ||
2022-09-14 | CVE-2022-22520 | A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-10-27 | CVE-2021-34580 | In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2021-08-02 | CVE-2021-34575 | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2020-09-30 | CVE-2020-24570 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a CSRF issue (with resultant SSRF) in the com_mb24proxy module, allowing attackers to steal session information from logged-in users with a crafted link. | Mbconnect24, Mymbconnect24 | 6.5 |