Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
klinzmann application access server 2.0.48 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1465
Application Access Server (A-A-S) 2.0.48 has "wildbat" as its default password for the admin account, which makes it easier for remote malicious users to obtain access.
Klinzmann Application Access Server 2.0.48
NA
CVE-2009-1464
Multiple cross-site request forgery (CSRF) vulnerabilities in index.aas in Application Access Server (A-A-S) 2.0.48 allow remote malicious users to hijack the authentication of administrators for requests that (1) execute arbitrary programs via a command job, (2) stop services vi...
Klinzmann Application Access Server 2.0.48
5.5
CVSSv3
CVE-2009-1466
Application Access Server (A-A-S) 2.0.48 stores (1) passwords and (2) the port keyword in cleartext in aas.ini, which allows local users to obtain sensitive information by reading this file.
Klinzmann Application Access Server 2.0.48
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started