Show filters
301 Total Results
Displaying 51-60 of 301
Sort by:
Attacker Value
Unknown
CVE-2022-40207
Disclosure Date: May 10, 2023 (last updated February 24, 2025)
Improper access control in the Intel(R) SUR software before version 2.4.8989 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2022-41400
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings.
0
Attacker Value
Unknown
CVE-2022-41399
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database.
0
Attacker Value
Unknown
CVE-2022-41398
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
The optional Global Search feature for Sage 300 through version 2022 uses a set of hard-coded credentials for the accompanying Apache Solr instance. This issue could allow attackers to login to the Solr dashboard with admin privileges and access sensitive information.
0
Attacker Value
Unknown
CVE-2022-41397
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
The optional Web Screens and Global Search features for Sage 300 through version 2022 use a hard-coded 40-byte blowfish key ("LandlordPassKey") to encrypt and decrypt secrets stored in configuration files and in database tables.
0
Attacker Value
Unknown
CVE-2022-38583
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse their access to the "SharedData" folder on the connected Sage 300 server to view and/or modify the credentials associated with Sage 300 users and SQL accounts to impersonate users and/or access the SQL database as a system administrator. With system administrator-level access to the Sage 300 MS SQL database it would be possible to create, update, and delete all records associated with the program and, depending on the configuration, execute code on the underlying database server.
0
Attacker Value
Unknown
CVE-2023-24404
Disclosure Date: April 23, 2023 (last updated February 24, 2025)
Reflected Cross-Site Scripting (XSS) vulnerability in VryaSage Marketing Performance plugin <= 2.0.0 versions.
0
Attacker Value
Unknown
CVE-2022-34854
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2022-33964
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
0
Attacker Value
Unknown
CVE-2022-33946
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Improper authentication in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
0