Wibu

Codemeter

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.05.2025 00:00:00
  • Zuletzt bearbeitet 16.05.2025 14:42:18

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component mus...

Exploit
  • EPSS 8.53%
  • Veröffentlicht 16.06.2021 12:15:12
  • Zuletzt bearbeitet 21.11.2024 05:45:54

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.

Exploit
  • EPSS 2.54%
  • Veröffentlicht 16.06.2021 12:15:12
  • Zuletzt bearbeitet 21.11.2024 05:45:54

A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.

  • EPSS 0.24%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:25

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.

  • EPSS 0.29%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:25

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

  • EPSS 0.12%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:26

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid ...

  • EPSS 0.06%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:26

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker ...

  • EPSS 0.12%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:26

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or...

  • EPSS 0.13%
  • Veröffentlicht 16.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:59

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

Exploit
  • EPSS 0.64%
  • Veröffentlicht 07.09.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the "server name" field in actions/ChangeConfiguration....