Adremsoft

Netcrunch

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.62%
  • Veröffentlicht 16.12.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:50

AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 16.12.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:50

AdRem NetCrunch 10.6.0.4587 has a Cross-Site Request Forgery (CSRF) vulnerability in the NetCrunch web client. Successful exploitation requires a logged-in user to open a malicious page and leads to account takeover.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 16.12.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:26:49

AdRem NetCrunch 10.6.0.4587 has a Server-Side Request Forgery (SSRF) vulnerability in the NetCrunch server. Every user can trick the server into performing SMB requests to other systems.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 16.12.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:26:49

AdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the br...

  • EPSS 0.05%
  • Veröffentlicht 16.12.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:49

AdRem NetCrunch 10.6.0.4587 has Improper Credential Storage since the internal user database is readable by low-privileged users and passwords in the database are weakly encoded or encrypted.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 16.12.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:50

AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.

Exploit
  • EPSS 2.18%
  • Veröffentlicht 16.12.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:50

AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remot...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 16.12.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:50

AdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Wind...