Directory traversal vulnerability in SalesLogix 6.1 allows remote attackers to upload arbitrary files via a .. (dot dot) in a ProcessQueueFile request.
Max CVSS
5.0
EPSS Score
34.69%
Published
2004-10-18
Updated
2017-07-11
SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707.
Max CVSS
5.1
EPSS Score
1.11%
Published
2004-10-18
Updated
2017-07-11
SalesLogix 6.1 uses client-specified pathnames for writing certain files, which might allow remote authenticated users to create arbitrary files and execute code via the (1) vMME.AttachmentPath or (2) vMME.LibraryPath variables.
Max CVSS
7.5
EPSS Score
0.83%
Published
2004-10-18
Updated
2016-10-18
SalesLogix 6.1 includes usernames, passwords, and other sensitive information in the headers of an HTTP response, which could allow remote attackers to gain access.
Max CVSS
5.0
EPSS Score
1.46%
Published
2004-10-18
Updated
2017-07-11
SQL injection vulnerability in SalesLogix 6.1 allows remote attackers to execute arbitrary SQL statements via the id parameter in a view operation.
Max CVSS
7.5
EPSS Score
2.69%
Published
2004-10-18
Updated
2017-07-11
slxweb.dll in SalesLogix 6.1 allows remote attackers to obtain sensitive information via a (1) Library or (2) Attachment request with an invalid file parameter, which reveals the path in an error message.
Max CVSS
5.0
EPSS Score
0.75%
Published
2004-10-18
Updated
2017-07-11
slxweb.dll in SalesLogix 6.1 allows remote attackers to cause a denial service (application crash) via an invalid HTTP request, which might also leak sensitive information in the ErrorLogMsg cookie.
Max CVSS
6.4
EPSS Score
1.98%
Published
2004-10-18
Updated
2017-07-11
SalesLogix 6.1 allows remote attackers to bypass authentication by modifying the slxweb cookie to set user=Admin, teams=ADMIN!, and usertype=Administrator.
Max CVSS
7.5
EPSS Score
1.88%
Published
2004-10-14
Updated
2017-07-11
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!