Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm powervc 1.2.0.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2014-4749
IBM PowerVC 1.2.0 before FixPack3 does not properly use the known_hosts file, which allows man-in-the-middle malicious users to spoof SSH servers via an arbitrary server key.
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
2.9
CVSSv2
CVE-2014-4750
IBM PowerVC Express Edition 1.2.0 before FixPack3 establishes an FTP session for transferring files to a managed IVM, which allows remote malicious users to discover credentials by sniffing the network.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
2.1
CVSSv2
CVE-2014-3093
IBM PowerVC 1.2.0 before FP3 and 1.2.1 before FP2 uses cleartext passwords in (1) api-paste.ini, (2) debug logs, (3) the installation process, (4) environment checks, (5) powervc-ldap-config, (6) powervc-restore, and (7) powervc-diag, which allows local users to obtain sensitive ...
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.1.0
4.3
CVSSv2
CVE-2015-0137
IBM PowerVC Standard 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 validates Hardware Management Console (HMC) certificates only during the pre-login stage, which allows man-in-the-middle malicious users to spoof devices via a crafted certificate.
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
2.1
CVSSv2
CVE-2015-0136
powervc-iso-import in IBM PowerVC 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 places an access token on the command line during IVM and PowerKVM management, which allows local users to obtain sensitive information by listing the process.
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
7.5
CVSSv2
CVE-2015-1937
IBM PowerVC 1.2.0.x up to and including 1.2.0.4, 1.2.1.x up to and including 1.2.1.2, and 1.2.2.x up to and including 1.2.2.2 does not require authentication for the ceilometer NoSQL database, which allows remote malicious users to read or write to arbitrary database records, and...
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.0.4
Ibm Powervc 1.2.2.0
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.1.2
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.2.1
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started