Vulnerabilities
Vulnerable Software
Vignette:  >> Storyserver  >> 5.0  Security Vulnerabilities
Vignette StoryServer 4 and 5, and Vignette V/5 and V/6, with the SSI EXEC feature enabled, allows remote attackers to execute arbitrary code via a text variable to a Vignette Application that is later displayed.
CVSS Score
7.5
EPSS Score
0.02
Published
2003-07-02
Vignette StoryServer 4 and 5, Vignette V/5, and possibly other versions allows remote attackers to perform unauthorized SELECT queries by setting the vgn_creds cookie to an arbitrary value and directly accessing the save template.
CVSS Score
6.4
EPSS Score
0.006
Published
2003-07-02
Vignette StoryServer and Vignette V/5 does not properly calculate the size of text variables, which causes Vignette to return unauthorized portions of memory, as demonstrated using the "-->" string in a CookieName argument to the login template, referred to as a "memory leak" in some reports.
CVSS Score
5.0
EPSS Score
0.024
Published
2003-06-30
Vignette StoryServer and Vignette V/5 allows remote attackers to obtain sensitive information via a request for the /vgn/style template.
CVSS Score
5.0
EPSS Score
0.009
Published
2003-06-30
The default login template (/vgn/login) in Vignette StoryServer 5 and Vignette V/5 generates different responses whether a user exists or not, which allows remote attackers to identify valid usernames via brute force attacks.
CVSS Score
5.0
EPSS Score
0.007
Published
2003-06-30
Vignette StoryServer 5 and Vignette V/5 allows remote attackers to read and modify license information, and cause a denial of service (service halt) by directly accessing the /vgn/license template.
CVSS Score
7.5
EPSS Score
0.011
Published
2003-06-30
Multiple Cross Site Scripting (XSS) vulnerabilities in Vignette StoryServer 4 and 5, and Vignette V/5 and V/6, allow remote attackers to insert arbitrary HTML and script via text variables, as demonstrated using the errInfo parameter of the default login template.
CVSS Score
4.3
EPSS Score
0.004
Published
2003-06-30
Vignette StoryServer 5 and Vignette V/6 allows remote attackers to execute arbitrary TCL code via (1) an HTTP query or cookie which is processed in the NEEDS command, or (2) an HTTP Referrer that is processed in the VALID_PATHS command.
CVSS Score
5.0
EPSS Score
0.009
Published
2003-06-30


Contact Us

Shodan ® - All rights reserved