Merlix
Products
2- 2 CVEs
- 2 CVEs
Recent CVEs
4| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2008-6871 | 0.03 | — | 0.05 | Jul 23, 2009 | Merlix Educate Server stores db.mdb under the web root with insufficient access control, which allows remote attackers to obtain unspecified sensitive information via a direct request. | ||
| CVE-2008-6870 | 0.03 | — | 0.02 | Jul 23, 2009 | Merlix Educate Server allows remote attackers to bypass intended security restrictions and obtain sensitive information via a direct request to (1) config.asp and (2) users.asp. | ||
| CVE-2008-5600 | 0.03 | — | 0.06 | Dec 16, 2008 | Merlix Teamworx Server stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for teamworx.mdb. | ||
| CVE-2008-5599 | 0.03 | — | 0.00 | Dec 16, 2008 | SQL injection vulnerability in default.asp in Merlix Teamworx Server allows remote attackers to execute arbitrary SQL commands via the password parameter (aka passwd field) in a login action. NOTE: some of these details are obtained from third party information. |
- CVE-2008-6871Jul 23, 2009risk 0.03cvss —epss 0.05
Merlix Educate Server stores db.mdb under the web root with insufficient access control, which allows remote attackers to obtain unspecified sensitive information via a direct request.
- CVE-2008-6870Jul 23, 2009risk 0.03cvss —epss 0.02
Merlix Educate Server allows remote attackers to bypass intended security restrictions and obtain sensitive information via a direct request to (1) config.asp and (2) users.asp.
- CVE-2008-5600Dec 16, 2008risk 0.03cvss —epss 0.06
Merlix Teamworx Server stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for teamworx.mdb.
- CVE-2008-5599Dec 16, 2008risk 0.03cvss —epss 0.00
SQL injection vulnerability in default.asp in Merlix Teamworx Server allows remote attackers to execute arbitrary SQL commands via the password parameter (aka passwd field) in a login action. NOTE: some of these details are obtained from third party information.