Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp arcsight logger vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2019-11655
Unrestricted file upload vulnerability in Micro Focus ArcSight Logger, version 6.7.0 and later. This vulnerability could allow Unrestricted Upload of File with Dangerous type.
Hp Arcsight Logger
3.5
CVSSv2
CVE-2019-11656
Stored XSS vulnerability in Micro Focus ArcSight Logger, affects versions prior to Logger 6.7.1 HotFix 6.7.1.8262.0. This vulnerability could allow Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
Hp Arcsight Logger
Hp Arcsight Logger 6.7.1
4.3
CVSSv2
CVE-2019-3485
Mitigates a stored cross site scripting issue in ArcSight Logger versions before 6.7.1
Hp Arcsight Logger
7.5
CVSSv2
CVE-2019-3479
Mitigates a potential remote code execution issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
4.3
CVSSv2
CVE-2019-3480
Mitigates a stored/reflected XSS issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
7.5
CVSSv2
CVE-2019-3481
Mitigates a XML External Entity Parsing issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
6.8
CVSSv2
CVE-2019-3482
Mitigates a directory traversal issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
6.8
CVSSv2
CVE-2019-3483
Mitigates a potential information leakage issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
7.2
CVSSv2
CVE-2019-3484
Mitigates a remote code execution issue in ArcSight Logger versions before 6.7.
Hp Arcsight Logger
7.5
CVSSv2
CVE-2015-6863
HPE ArcSight Logger prior to 6.1P1 allows remote malicious users to execute arbitrary code via unspecified input to the (1) Intellicus or (2) client-certificate upload component.
Hp Arcsight Logger
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »