Filtered by vendor Ge
Subscriptions
Filtered by product Ge Communicator
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-6566 | 1 Ge | 1 Ge Communicator | 2024-11-21 | 7.8 High |
GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system. | ||||
CVE-2019-6564 | 1 Ge | 1 Ge Communicator | 2024-11-21 | 7.8 High |
GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade. | ||||
CVE-2019-6548 | 1 Ge | 1 Ge Communicator | 2024-11-21 | 9.8 Critical |
GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user. | ||||
CVE-2019-6546 | 1 Ge | 1 Ge Communicator | 2024-11-21 | 7.8 High |
GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements. | ||||
CVE-2019-6544 | 1 Ge | 1 Ge Communicator | 2024-11-21 | 5.6 Medium |
GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user. | ||||
CVE-2017-7908 | 2 Ge, Gigasoft | 2 Ge Communicator, Proessentials | 2024-11-21 | N/A |
A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls. |
Page 1 of 1.