Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mymbconnect24
(Mbconnectline)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 33 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-16 | CVE-2020-35568 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An incomplete filter applied to a database response allows an authenticated attacker to gain non-public information about other users and devices in the account. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 4.3 | ||
2021-02-16 | CVE-2020-35569 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page. | Mbconnect24, Mymbconnect24 | 6.1 | ||
2021-02-16 | CVE-2020-35570 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-08-02 | CVE-2021-34574 | In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A | ||
2021-08-02 | CVE-2021-34575 | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2021-10-27 | CVE-2021-34580 | In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2022-09-14 | CVE-2022-22520 | A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A | ||
2023-06-06 | CVE-2023-0985 | An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account. | Mbconnect24, Mymbconnect24 | N/A | ||
2023-06-06 | CVE-2023-1779 | Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information. | Mbconnect24, Mymbconnect24 | N/A | ||
2023-10-16 | CVE-2023-4834 | In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A |