Описание
A vulnerability has been identified in SICAM TOOLBOX II (All versions). Affected applications use a circumventable access control within a database service. This could allow an attacker to access the database.
A vulnerability has been identified in SICAM TOOLBOX II (All versions). Affected applications use a circumventable access control within a database service. This could allow an attacker to access the database.
Связанные уязвимости
A vulnerability has been identified in SICAM TOOLBOX II (All versions). Affected applications use a circumventable access control within a database service. This could allow an attacker to access the database.
Уязвимость инженерного программного обеспечения SICAM TOOLBOX II, связанная с недостаточной защитой протокола управления передачей данных, позволяющая нарушителю обойти контроль доступа в службе базы данных