Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://seccore.at/blog/cves-meona/ |
|
Wed, 20 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SQL Editor Privilege Escalation Exposes Cleartext Passwords |
Wed, 20 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect Privilege Assignment vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server Component enables the export of user data, including cleartext passwords, via the SQL editor. This issue affects Meona Client Launcher Component: through 19.06.2020 15:11:49; Meona Server Component: through 2025.04 5+323020. | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2026-05-20T10:46:51.995Z
Reserved: 2026-01-07T09:31:00.563Z
Link: CVE-2026-22315
Updated: 2026-05-20T12:03:34.350Z
Status : Received
Published: 2026-05-20T11:16:26.187
Modified: 2026-05-20T11:16:26.187
Link: CVE-2026-22315
No data.
OpenCVE Enrichment
Updated: 2026-05-20T12:30:16Z