Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
siemens spcanywhere vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2015-1597
The Siemens SPCanywhere application for Android does not use encryption during the loading of code, which allows man-in-the-middle malicious users to execute arbitrary code by modifying the client-server data stream.
Siemens Spcanywhere
2.1
CVSSv2
CVE-2015-1599
The Siemens SPCanywhere application for iOS allows physically proximate malicious users to bypass intended access restrictions by leveraging a filesystem architectural error.
Siemens Spcanywhere
4.3
CVSSv2
CVE-2015-1595
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle malicious users to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
Siemens Spcanywhere
2.1
CVSSv2
CVE-2015-1598
The Siemens SPCanywhere application for Android does not properly store application passwords, which allows physically proximate malicious users to obtain sensitive information by examining the device filesystem.
Siemens Spcanywhere
5.8
CVSSv2
CVE-2015-1596
The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Siemens Spcanywhere
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started