Total vulnerabilities in the database
Cybozu Dezie 8.0.0 to 8.1.1 allows remote attackers to bypass access restrictions to obtain an arbitrary DBM (Cybozu Dezie proprietary format) file via unspecified vectors.
Software | From | Fixed in |
---|---|---|
cybozu / dezie | 8.1.1 | 8.1.1.x |
cybozu / dezie | 8.0.4 | 8.0.4.x |
cybozu / dezie | 8.0.6 | 8.0.6.x |
cybozu / dezie | 8.1.0 | 8.1.0.x |
cybozu / dezie | 8.0.5 | 8.0.5.x |
cybozu / dezie | 8.0.7 | 8.0.7.x |
cybozu / dezie | 8.0.2 | 8.0.2.x |
cybozu / dezie | 8.0.3 | 8.0.3.x |