Vulnerabilities (CVE)

Filtered by vendor Seling Subscribe
Filtered by product Visual Access Manager
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-50811 1 Seling 1 Visual Access Manager 2024-04-29 N/A 6.5 MEDIUM
An issue discovered in SELESTA Visual Access Manager 4.38.6 allows attackers to modify the “computer” POST parameter related to the ID of a specific reception by POST HTTP request interception. Iterating that parameter, it has been possible to access to the application and take control of many other receptions in addition the assigned one.
CVE-2019-19989 1 Seling 1 Visual Access Manager 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Several PHP pages, and other type of files, are reachable by any user without checking for user identity and authorization.
CVE-2019-19987 1 Seling 1 Visual Access Manager 2023-12-10 4.3 MEDIUM 6.5 MEDIUM
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. It allows Cross-Site Request Forgery (CSRF) on any HTML form. An attacker can exploit the vulnerability to abuse functionalities such as change password, add user, add privilege, and so on.
CVE-2019-19994 1 Seling 1 Visual Access Manager 2023-12-10 10.0 HIGH 9.8 CRITICAL
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. It allows blind Command Injection. An attacker without authentication is able to execute arbitrary operating system command by injecting the vulnerable parameter in the PHP Web page /common/vam_monitor_sap.php.
CVE-2019-19986 1 Seling 1 Visual Access Manager 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. An attacker without authentication is able to execute arbitrary SQL SELECT statements by injecting the HTTP (POST or GET) parameter persoid into /tools/VamPersonPhoto.php. The SQL Injection type is Error-based (this means that relies on error messages thrown by the database server to obtain information about the structure of the database).
CVE-2019-19988 1 Seling 1 Visual Access Manager 2023-12-10 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. A user with valid credentials is able to create and write XML files on the filesystem via /common/vam_editXml.php in the web interface. The vulnerable PHP page checks none of these: the parameter that identifies the file name to be created, the destination path, or the extension. Thus, an attacker can manipulate the file name to create any type of file within the filesystem with arbitrary content.
CVE-2019-19992 1 Seling 1 Visual Access Manager 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. A user with valid credentials is able to read XML files on the filesystem via the web interface. The PHP page /common/vam_editXml.php doesn't check the parameter that identifies the file name to be read. Thus, an attacker can manipulate the file name to access a potentially sensitive file within the filesystem.
CVE-2019-19990 1 Seling 1 Visual Access Manager 2023-12-10 3.5 LOW 5.4 MEDIUM
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Multiple Stored Cross-site scripting (XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML via the web pages /monitor/s_headmodel.php and /vam/vam_user.php.
CVE-2019-19991 1 Seling 1 Visual Access Manager 2023-12-10 3.5 LOW 5.4 MEDIUM
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Multiple Reflected Cross-site scripting (XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML via the web pages /vam/vam_anagraphic.php, /vam/vam_vamuser.php, /common/vamp_main.php, and /wiz/change_password.php.
CVE-2019-19993 1 Seling 1 Visual Access Manager 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Several full path disclosure vulnerability were discovered. A user, even with no authentication, may simply send arbitrary content to the vulnerable pages to generate error messages that expose some full paths.