Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fujitsu arconte aurea 1.5.0.0 vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2023-4093
Reflected and persistent XSS vulnerability in Arconte Áurea, in its 1.5.0.0 version. The exploitation of this vulnerability could allow an malicious user to inject malicious JavaScript code, compromise the victim's browser and take control of it, redirect the user to ...
Fujitsu Arconte Aurea 1.5.0.0
8.2
CVSSv3
CVE-2023-4094
ARCONTE Aurea's authentication system, in its 1.5.0.0 version, could allow an malicious user to make incorrect access requests in order to block each legitimate account and cause a denial of service. In addition, a resource has been identified that could allow circumventing ...
Fujitsu Arconte Aurea 1.5.0.0
5.3
CVSSv3
CVE-2023-4095
User enumeration vulnerability in Arconte Áurea 1.5.0.0 version. The exploitation of this vulnerability could allow an malicious user to obtain a list of registered users in the application, obtaining the necessary information to perform more complex attacks on the platfor...
Fujitsu Arconte Aurea 1.5.0.0
8.2
CVSSv3
CVE-2023-4096
Weak password recovery mechanism vulnerability in Fujitsu Arconte Áurea version 1.5.0.0, which exploitation could allow an malicious user to perform a brute force attack on the emailed PIN number in order to change the password of a legitimate user.
Fujitsu Arconte Aurea 1.5.0.0
9.8
CVSSv3
CVE-2023-4092
SQL injection vulnerability in Arconte Áurea, in its 1.5.0.0 version. The exploitation of this vulnerability could allow an malicious user to read sensitive data from the database, modify data (insert/update/delete), perform database administration operations and, in some ...
Fujitsu Arconte Aurea 1.5.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started