Vulnerabilities
Vulnerable Software
Vdgsecurity:  >> Vdg Sense  Security Vulnerabilities
VDG Security SENSE (formerly DIVA) 2.3.13 stores administrator credentials in cleartext, which allows attackers to obtain sensitive information by reading the plugin configuration files.
CVSS Score
5.0
EPSS Score
0.004
Published
2015-01-08
VDG Security SENSE (formerly DIVA) 2.3.13 performs authentication with a password hash instead of a password, which allows remote attackers to gain login access by leveraging knowledge of a password hash.
CVSS Score
5.0
EPSS Score
0.005
Published
2015-01-08
VDG Security SENSE (formerly DIVA) 2.3.13 sends the user database when a user logs in, which allows remote authenticated users to obtain usernames and password hashes by logging in to TCP port 51410 and reading the response.
CVSS Score
4.0
EPSS Score
0.003
Published
2015-01-08
VDG Security SENSE (formerly DIVA) 2.3.13 has a hardcoded password of (1) ArpaRomaWi for the root Postgres account and !DVService for the (2) postgres and (3) NTP Windows user accounts, which allows remote attackers to obtain access.
CVSS Score
5.0
EPSS Score
0.004
Published
2015-01-08
VDG Security SENSE (formerly DIVA) before 2.3.15 allows remote attackers to bypass authentication, and consequently read and modify arbitrary plugin settings, via an encoded : (colon) character in the Authorization HTTP header.
CVSS Score
6.4
EPSS Score
0.006
Published
2015-01-08
Directory traversal vulnerability in VDG Security SENSE (formerly DIVA) 2.3.13 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI to images/.
CVSS Score
5.0
EPSS Score
0.006
Published
2015-01-02
Multiple stack-based buffer overflows in the DIVA web service API (/webservice) in VDG Security SENSE (formerly DIVA) 2.3.13 allow remote attackers to execute arbitrary code via the (1) user or (2) password parameter in an AuthenticateUser request.
CVSS Score
7.5
EPSS Score
0.076
Published
2015-01-02


Contact Us

Shodan ® - All rights reserved