Vulnerabilities (CVE)

Filtered by vendor Orpak Subscribe
Filtered by product Siteomat
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-14854 1 Orpak 1 Siteomat 2023-12-10 7.5 HIGH 9.8 CRITICAL
A stack buffer overflow exists in one of the Orpak SiteOmat CGI components, allowing for remote code execution. The vulnerability affects all versions prior to 2017-09-25.
CVE-2017-14852 1 Orpak 1 Siteomat 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
An insecure communication was found between a user and the Orpak SiteOmat management console for all known versions, due to an invalid SSL certificate. The attack allows for an eavesdropper to capture the communication and decrypt the data.
CVE-2017-14851 1 Orpak 1 Siteomat 2023-12-10 7.5 HIGH 9.8 CRITICAL
A SQL injection vulnerability exists in all Orpak SiteOmat versions prior to 2017-09-25. The vulnerability is in the login page, where the authentication validation process contains an insecure SELECT query. The attack allows for authentication bypass.
CVE-2017-14853 1 Orpak 1 Siteomat 2023-12-10 10.0 HIGH 9.8 CRITICAL
The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device.
CVE-2017-14850 1 Orpak 1 Siteomat 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
All known versions of the Orpak SiteOmat web management console is vulnerable to multiple instances of Stored Cross-site Scripting due to improper external user-input validation. An attacker with access to the web interface is able to hijack sessions or navigate victims outside of SiteOmat, to a malicious server owned by him.
CVE-2017-14728 1 Orpak 1 Siteomat 2023-12-10 7.5 HIGH 9.8 CRITICAL
An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.