Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spcanywhere vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2015-1599
The Siemens SPCanywhere application for iOS allows physically proximate malicious users to bypass intended access restrictions by leveraging a filesystem architectural error.
Siemens Spcanywhere
6.8
CVSSv2
CVE-2015-1597
The Siemens SPCanywhere application for Android does not use encryption during the loading of code, which allows man-in-the-middle malicious users to execute arbitrary code by modifying the client-server data stream.
Siemens Spcanywhere
2.1
CVSSv2
CVE-2015-1598
The Siemens SPCanywhere application for Android does not properly store application passwords, which allows physically proximate malicious users to obtain sensitive information by examining the device filesystem.
Siemens Spcanywhere
4.3
CVSSv2
CVE-2015-1595
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle malicious users to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
Siemens Spcanywhere
5.8
CVSSv2
CVE-2015-1596
The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Siemens Spcanywhere
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28254
CVE-2024-32515
CVE-2024-21338
validation
CVE-2024-32522
dos
CVE-2024-2101
CVE-2024-21107
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started