Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In August 2021
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
CVSS Score
7.5
EPSS Score
0.001
Published
2021-08-31
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
CVSS Score
5.4
EPSS Score
0.003
Published
2021-08-31
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
CVSS Score
3.3
EPSS Score
0.001
Published
2021-08-31
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
CVSS Score
5.5
EPSS Score
0.0
Published
2021-08-31
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-08-31
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
CVSS Score
9.8
EPSS Score
0.003
Published
2021-08-31
Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.
CVSS Score
7.5
EPSS Score
0.016
Published
2021-08-31
axios is vulnerable to Inefficient Regular Expression Complexity
CVSS Score
7.5
EPSS Score
0.083
Published
2021-08-31
An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin.
CVSS Score
6.1
EPSS Score
0.011
Published
2021-08-31
An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS].
CVSS Score
5.4
EPSS Score
0.004
Published
2021-08-31


Contact Us

Shodan ® - All rights reserved