Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2021-34559
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
0
Attacker Value
Unknown
CVE-2021-34564
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
0
Attacker Value
Unknown
CVE-2021-34562
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
0
Attacker Value
Unknown
CVE-2021-34560
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
0
Attacker Value
Unknown
CVE-2021-34563
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
0
Attacker Value
Unknown
CVE-2021-34565
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
0
Attacker Value
Unknown
CVE-2021-33555
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.
0
Attacker Value
Unknown
CVE-2021-34561
Disclosure Date: August 16, 2021 (last updated November 28, 2024)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
0