Visam

Vbase Web-remote

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.35%
  • Veröffentlicht 27.07.2022 21:15:08
  • Zuletzt bearbeitet 17.04.2025 16:15:23

VISAM VBASE version 11.6.0.6 is vulnerable to improper access control via the web-remote endpoint, which may allow an unauthenticated user viewing access to folders and files in the directory listing.

  • EPSS 0.2%
  • Veröffentlicht 27.07.2022 21:15:08
  • Zuletzt bearbeitet 17.04.2025 16:15:23

VISAM VBASE version 11.6.0.6 does not neutralize or incorrectly neutralizes user-controllable input before the data is placed in output used as a public-facing webpage.

  • EPSS 0.2%
  • Veröffentlicht 27.07.2022 21:15:08
  • Zuletzt bearbeitet 17.04.2025 16:15:23

VISAM VBASE version 11.6.0.6 processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

  • EPSS 0.02%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:40

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or ove...

  • EPSS 0.09%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:27

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow an unauthenticated attacker to discover the cryptographic key from the web server and gain information about the login and the encryption/decryption mechanism, which may be exp...

  • EPSS 0.05%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:28

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next time a privileged user runs the application...

  • EPSS 0.28%
  • Veröffentlicht 03.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:28

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow input passed in the URL that is not properly verified before use, which may allow an attacker to read arbitrary files from local resources.

  • EPSS 0.33%
  • Veröffentlicht 03.04.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:40

VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow a vulnerable ActiveX component to be exploited resulting in a buffer overflow, which may lead to a denial-of-service condition and execution of arbitrary code.