Visam

Vbase Editor

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:40

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or ove...

  • EPSS 0.09%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:27

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow an unauthenticated attacker to discover the cryptographic key from the web server and gain information about the login and the encryption/decryption mechanism, which may be exp...

  • EPSS 0.05%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:28

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next time a privileged user runs the application...

  • EPSS 0.28%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:28

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow input passed in the URL that is not properly verified before use, which may allow an attacker to read arbitrary files from local resources.

  • EPSS 0.33%
  • Veröffentlicht 03.04.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:40

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow a vulnerable ActiveX component to be exploited resulting in a buffer overflow, which may lead to a denial-of-service condition and execution of arbitrary code.