Filtered by vendor Vignette
Subscribe
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-18941 | 1 Vignette | 1 Content Management | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
In Vignette Content Management version 6, it is possible to gain remote access to administrator privileges by discovering the admin password in the vgn/ccb/user/mgmt/user/edit/0,1628,0,00.html?uid=admin HTML source code, and then creating a privileged user account. NOTE: this product is discontinued. | |||||
CVE-2008-6412 | 1 Vignette | 1 Vignette Content Management | 2024-11-21 | 7.5 HIGH | N/A |
Unspecified vulnerability in Vignette Content Management 7.3.0.5, 7.3.1, 7.3.1.1, 7.4, and 7.5 allows "low privileged" users to gain administrator privileges via unknown attack vectors. | |||||
CVE-2004-0917 | 1 Vignette | 1 Application Portal | 2024-11-20 | 5.0 MEDIUM | N/A |
The default installation of Vignette Application Portal installs the diagnostic utility without authentication requirements, which allows remote attackers to gain sensitive information, such as server and OS version, and conduct unauthorized activities via an HTTP request to /diag. | |||||
CVE-2003-0405 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 5.0 MEDIUM | N/A |
Vignette StoryServer 5 and Vignette V/6 allows remote attackers to execute arbitrary TCL code via (1) an HTTP query or cookie which is processed in the NEEDS command, or (2) an HTTP Referrer that is processed in the VALID_PATHS command. | |||||
CVE-2003-0404 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 4.3 MEDIUM | N/A |
Multiple Cross Site Scripting (XSS) vulnerabilities in Vignette StoryServer 4 and 5, and Vignette V/5 and V/6, allow remote attackers to insert arbitrary HTML and script via text variables, as demonstrated using the errInfo parameter of the default login template. | |||||
CVE-2003-0403 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 7.5 HIGH | N/A |
Vignette StoryServer 5 and Vignette V/5 allows remote attackers to read and modify license information, and cause a denial of service (service halt) by directly accessing the /vgn/license template. | |||||
CVE-2003-0402 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 5.0 MEDIUM | N/A |
The default login template (/vgn/login) in Vignette StoryServer 5 and Vignette V/5 generates different responses whether a user exists or not, which allows remote attackers to identify valid usernames via brute force attacks. | |||||
CVE-2003-0401 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 5.0 MEDIUM | N/A |
Vignette StoryServer and Vignette V/5 allows remote attackers to obtain sensitive information via a request for the /vgn/style template. | |||||
CVE-2003-0400 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 5.0 MEDIUM | N/A |
Vignette StoryServer and Vignette V/5 does not properly calculate the size of text variables, which causes Vignette to return unauthorized portions of memory, as demonstrated using the "-->" string in a CookieName argument to the login template, referred to as a "memory leak" in some reports. | |||||
CVE-2003-0399 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 6.4 MEDIUM | N/A |
Vignette StoryServer 4 and 5, Vignette V/5, and possibly other versions allows remote attackers to perform unauthorized SELECT queries by setting the vgn_creds cookie to an arbitrary value and directly accessing the save template. | |||||
CVE-2003-0398 | 1 Vignette | 3 Content Suite, Storyserver, Vignette | 2024-11-20 | 7.5 HIGH | N/A |
Vignette StoryServer 4 and 5, and Vignette V/5 and V/6, with the SSI EXEC feature enabled, allows remote attackers to execute arbitrary code via a text variable to a Vignette Application that is later displayed. | |||||
CVE-2002-0385 | 1 Vignette | 2 Storyserver, Vignette | 2024-11-20 | 5.0 MEDIUM | N/A |
Vignette Story Server 4.1 and 6.0 allows remote attackers to obtain sensitive information via a request that contains a large number of '"' (double quote) and and '>' characters, which causes the TCL interpreter to crash and include stack data in the output. |