Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mymbconnect24
(Mbconnectline)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 33 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-16 | CVE-2020-35565 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The login pages bruteforce detection is disabled by default. | Mbconnect24, Mymbconnect24 | 9.8 | ||
2021-02-16 | CVE-2020-35566 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An attacker can read arbitrary JSON files via Local File Inclusion. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-02-16 | CVE-2020-35567 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances. | Mbconnect24, Mymbconnect24 | 7.8 | ||
2021-02-16 | CVE-2020-35568 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An incomplete filter applied to a database response allows an authenticated attacker to gain non-public information about other users and devices in the account. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 4.3 | ||
2021-02-16 | CVE-2020-35569 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page. | Mbconnect24, Mymbconnect24 | 6.1 | ||
2021-02-16 | CVE-2020-35570 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-08-02 | CVE-2021-34574 | In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A | ||
2021-08-02 | CVE-2021-34575 | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2021-10-27 | CVE-2021-34580 | In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. | Mbconnect24, Mymbconnect24 | 7.5 | ||
2022-09-14 | CVE-2022-22520 | A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A |