Vulnerabilities > Auvesy > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-22 | CVE-2021-38449 | Unspecified vulnerability in Auvesy Versiondog Some API functions permit by-design writing or copying data into a given buffer. | 9.8 |
2021-10-22 | CVE-2021-38453 | Unspecified vulnerability in Auvesy Versiondog Some API functions allow interaction with the registry, which includes reading values as well as data modification. | 9.1 |
2021-10-22 | CVE-2021-38457 | Missing Authentication for Critical Function vulnerability in Auvesy Versiondog The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication. | 9.8 |
2021-10-22 | CVE-2021-38459 | Unspecified vulnerability in Auvesy Versiondog The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. | 9.8 |
2021-10-22 | CVE-2021-38471 | Unspecified vulnerability in Auvesy Versiondog There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files. | 9.1 |
2021-10-22 | CVE-2021-38477 | Unspecified vulnerability in Auvesy Versiondog There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files. | 9.8 |
2021-10-22 | CVE-2021-38481 | Unspecified vulnerability in Auvesy Versiondog The scheduler service running on a specific TCP port enables the user to start and stop jobs. | 9.8 |