Lucene search

K
SageSage 300

4 matches found

CVE
CVE
added 2022/07/14 4:15 p.m.54 views

CVE-2021-45492

In Sage 300 ERP (formerly accpac) through 6.8.x, the installer configures the C:\Sage\Sage300\Runtime directory to be the first entry in the system-wide PATH environment variable. However, this directory is writable by unprivileged users because the Sage installer fails to set explicit permissions ...

7.8CVSS7.9AI score0.00031EPSS
CVE
CVE
added 2023/04/28 1:15 p.m.31 views

CVE-2022-38583

On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse their access to the "SharedData" folder on the connected Sage 300 server to view and/or modify the...

7.8CVSS7.8AI score0.00045EPSS
CVE
CVE
added 2023/04/28 1:15 p.m.31 views

CVE-2022-41398

The optional Global Search feature for Sage 300 through version 2022 uses a set of hard-coded credentials for the accompanying Apache Solr instance. This issue could allow attackers to login to the Solr dashboard with admin privileges and access sensitive information.

7.5CVSS7.5AI score0.00069EPSS
CVE
CVE
added 2023/04/28 1:15 p.m.30 views

CVE-2022-41399

The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database.

7.5CVSS7.6AI score0.00069EPSS