Vdgsecurity

Vdg Sense

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.38%
  • Veröffentlicht 08.01.2015 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VDG Security SENSE (formerly DIVA) 2.3.13 stores administrator credentials in cleartext, which allows attackers to obtain sensitive information by reading the plugin configuration files.

Exploit
  • EPSS 0.49%
  • Veröffentlicht 08.01.2015 15:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VDG Security SENSE (formerly DIVA) 2.3.13 performs authentication with a password hash instead of a password, which allows remote attackers to gain login access by leveraging knowledge of a password hash.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 08.01.2015 15:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VDG Security SENSE (formerly DIVA) 2.3.13 sends the user database when a user logs in, which allows remote authenticated users to obtain usernames and password hashes by logging in to TCP port 51410 and reading the response.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 08.01.2015 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VDG Security SENSE (formerly DIVA) 2.3.13 has a hardcoded password of (1) ArpaRomaWi for the root Postgres account and !DVService for the (2) postgres and (3) NTP Windows user accounts, which allows remote attackers to obtain access.

Exploit
  • EPSS 0.61%
  • Veröffentlicht 08.01.2015 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VDG Security SENSE (formerly DIVA) before 2.3.15 allows remote attackers to bypass authentication, and consequently read and modify arbitrary plugin settings, via an encoded : (colon) character in the Authorization HTTP header.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 02.01.2015 20:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Directory traversal vulnerability in VDG Security SENSE (formerly DIVA) 2.3.13 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI to images/.

Exploit
  • EPSS 7.65%
  • Veröffentlicht 02.01.2015 20:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple stack-based buffer overflows in the DIVA web service API (/webservice) in VDG Security SENSE (formerly DIVA) 2.3.13 allow remote attackers to execute arbitrary code via the (1) user or (2) password parameter in an AuthenticateUser request.