Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | N/A |
CWE-ID | CWE-264 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Password Manager Pro Server applications / Other server solutions |
Vendor |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU84520
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges within the application.
The vulnerability exists due to improperly imposed security restrictions. A local user with access to default SSH commands and command sets can edit their details
by manipulating a set of commands.
Install updates from vendor's website.
Vulnerable software versionsPassword Manager Pro: before 12330
External linkshttp://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp12330
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84521
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to improperly imposed security restrictions. A remote user can delete landing servers created by other users.Install updates from vendor's website.
Vulnerable software versionsPassword Manager Pro: before 12330
External linkshttp://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp12330
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84522
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote user can obtain the resource owner name.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPassword Manager Pro: before 12330
External linkshttp://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp12330
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84523
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to improperly imposed security restrictions. A remote user can update other users' PGP keys, deploy unowned IIS binding info, delete certificate groups of other users.Install updates from vendor's website.
Vulnerable software versionsPassword Manager Pro: before 12330
External linkshttp://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp12330
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.