Siemens Sinec Ins vulnerabilities

37 known vulnerabilities affecting siemens/sinec_ins.

Total CVEs
37
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH12MEDIUM17LOW3

Vulnerabilities

Page 2 of 2
CVE-2022-2097MEDIUMCVSS 5.3fixed in 1.0v1.02022-07-05
CVE-2022-2097 [MEDIUM] CWE-327 CVE-2022-2097: AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not en AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Sinc
nvd
CVE-2022-2068HIGHCVSS 7.3fixed in 1.0v1.02022-06-21
CVE-2022-2068 [HIGH] CVE-2022-2068: In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstanc In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certifica
nvd
CVE-2021-25220MEDIUMCVSS 6.8fixed in 1.0v1.02022-03-23
CVE-2021-25220 [MEDIUM] CWE-444 CVE-2021-25220: BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with
nvd
CVE-2022-0396MEDIUMCVSS 5.3fixed in 1.0v1.02022-03-23
CVE-2022-0396 [MEDIUM] CWE-404 CVE-2022-0396: BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supporte BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
nvd
CVE-2021-4160MEDIUMCVSS 5.9fixed in 1.0v1.02022-01-28
CVE-2021-4160 [MEDIUM] CVE-2021-4160: There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this de
nvd
CVE-2022-0235MEDIUMCVSS 6.1fixed in 1.0v1.02022-01-16
CVE-2022-0235 [MEDIUM] CWE-200 CVE-2022-0235: node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
nvd
CVE-2022-0155MEDIUMCVSS 6.5fixed in 1.0v1.02022-01-10
CVE-2022-0155 [MEDIUM] CWE-359 CVE-2022-0155: follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
nvd
CVE-2021-22945CRITICALCVSS 9.1fixed in 1.0.1.12021-09-23
CVE-2021-22945 [CRITICAL] CWE-415 CVE-2021-22945: When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances errone When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
nvd
CVE-2021-3749HIGHCVSS 7.5fixed in 1.0v1.02021-08-31
CVE-2021-3749 [HIGH] CWE-1333 CVE-2021-3749: axios is vulnerable to Inefficient Regular Expression Complexity axios is vulnerable to Inefficient Regular Expression Complexity
nvd
CVE-2021-25217HIGHCVSS 7.4fixed in 1.0v1.02021-05-26
CVE-2021-25217 [HIGH] CWE-119 CVE-2021-25217: In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., re In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been of
nvd
CVE-2021-23841MEDIUMCVSS 5.9fixed in 1.0v1.02021-02-16
CVE-2021-23841 [MEDIUM] CWE-476 CVE-2021-23841: The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This ma
nvd
CVE-2021-23839LOWCVSS 3.7fixed in 1.0v1.02021-02-16
CVE-2021-23839 [LOW] CWE-327 CVE-2021-23839: OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configur OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A
nvd
CVE-2021-23337HIGHCVSS 7.2PoCfixed in 1.0v1.02021-02-15
CVE-2021-23337 [HIGH] CWE-94 CVE-2021-23337: Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
nvd
CVE-2020-28500MEDIUMCVSS 5.3fixed in 1.0v1.02021-02-15
CVE-2020-28500 [MEDIUM] CVE-2020-28500: Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
nvd
CVE-2020-7793HIGHCVSS 7.5fixed in 1.0v1.02020-12-11
CVE-2020-7793 [HIGH] CVE-2020-7793: The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
nvd
CVE-2020-28168MEDIUMCVSS 5.9fixed in 1.0v1.02020-11-06
CVE-2020-28168 [MEDIUM] CWE-918 CVE-2020-28168: Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attack Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
nvd
CVE-2020-12762HIGHCVSS 7.8v1.02020-05-09
CVE-2020-12762 [HIGH] CWE-190 CVE-2020-12762: json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demons json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
nvd