Vulnerabilities (CVE)

Filtered by vendor Ge Subscribe
Filtered by product Ge Communicator
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-6566 1 Ge 1 Ge Communicator 2024-11-21 7.2 HIGH 7.8 HIGH
GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system.
CVE-2019-6564 1 Ge 1 Ge Communicator 2024-11-21 6.9 MEDIUM 7.8 HIGH
GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.
CVE-2019-6548 1 Ge 1 Ge Communicator 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
CVE-2019-6546 1 Ge 1 Ge Communicator 2024-11-21 6.8 MEDIUM 7.8 HIGH
GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.
CVE-2019-6544 1 Ge 1 Ge Communicator 2024-11-21 6.8 MEDIUM 5.6 MEDIUM
GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
CVE-2017-7908 2 Ge, Gigasoft 2 Ge Communicator, Proessentials 2024-11-21 6.8 MEDIUM 7.6 HIGH
A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls.