Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Vbase_editor
(Visam)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-04-03 | CVE-2020-10601 | VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or overwriting the password hash. | Vbase_editor, Vbase_web\-Remote | 7.8 | ||
2020-04-03 | CVE-2020-7008 | VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow input passed in the URL that is not properly verified before use, which may allow an attacker to read arbitrary files from local resources. | Vbase_editor, Vbase_web\-Remote | N/A | ||
2020-04-03 | CVE-2020-7004 | VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next time a privileged user runs the application. | Vbase_editor, Vbase_web\-Remote | N/A | ||
2020-04-03 | CVE-2020-7000 | VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow an unauthenticated attacker to discover the cryptographic key from the web server and gain information about the login and the encryption/decryption mechanism, which may be exploited to bypass authentication of the HTML5 HMI web interface. | Vbase_editor, Vbase_web\-Remote | N/A | ||
2020-04-03 | CVE-2020-10599 | VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow a vulnerable ActiveX component to be exploited resulting in a buffer overflow, which may lead to a denial-of-service condition and execution of arbitrary code. | Vbase_editor, Vbase_web\-Remote | N/A |