A vulnerability was found in Siemens SINEMA Remote Connect Server up to 3.2 SP1. It has been rated as critical. This issue affects some unknown processing of the component Multi Factor Authentication. The manipulation leads to session fixiation.
The identification of this vulnerability is CVE-2024-42345. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Siemens SINEMA Remote Connect Client up to 3.2 SP1. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to sensitive information in log files.
This vulnerability was named CVE-2024-42344. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Siemens SINEMA Remote Connect Client up to 3.2 SP1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Multi-Factor Authentication. The manipulation leads to session expiration.
This vulnerability is known as CVE-2024-32006. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Siemens Mendix Runtime. This affects an unknown part of the component Basic Authentication Handler. The manipulation leads to observable response discrepancy.
This vulnerability is uniquely identified as CVE-2023-49069. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed state-sponsored operation codenamed Crimson Palace, indicating an expansion in the scope of the espionage effort.
Cybersecurity firm Sophos, which has been monitoring the cyber offensive, said it comprises three intrusion sets tracked as Cluster
A vulnerability, which was classified as problematic, has been found in Apple tvOS up to 11.0. Affected by this issue is some unknown functionality of the component Kernel. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2017-13852. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.
Shadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own