Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm emptoris sourcing 10.0.2.0 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2015-5024
IBM Emptoris Sourcing 10.0.2.0 before iFix6, 10.0.2.2 before iFix11, 10.0.2.3, 10.0.2.5 before iFix4, 10.0.2.6 before iFix8, 10.0.2.7 before iFix1, and 10.0.4.x before iFix2 allows remote authenticated users to obtain sensitive supplier-bid information via unspecified vectors.
Ibm Emptoris Sourcing 10.0.2.5
Ibm Emptoris Sourcing 10.0.2.7
Ibm Emptoris Sourcing 10.0.2.0
Ibm Emptoris Sourcing 10.0.2.2
Ibm Emptoris Sourcing 10.0.2.3
Ibm Emptoris Sourcing 10.0.2.6
Ibm Emptoris Sourcing 10.0.4.0
4.9
CVSSv2
CVE-2014-4790
IBM Emptoris Sourcing Portfolio 9.5.x prior to 9.5.1.3, 10.0.0.x prior to 10.0.0.1, 10.0.1.x prior to 10.0.1.3, and 10.0.2.x prior to 10.0.2.4 and Emptoris Spend Analysis 9.5.x prior to 9.5.0.4, 10.0.1.x prior to 10.0.1.3, and 10.0.2.x prior to 10.0.2.4 do not properly restrict u...
Ibm Emptoris Spend Analysis 10.0.2.2
Ibm Emptoris Spend Analysis 9.5.0.2
Ibm Emptoris Spend Analysis 9.5.0.3
Ibm Emptoris Spend Analysis 10.0.2.0
Ibm Emptoris Spend Analysis 10.0.1.0
Ibm Emptoris Spend Analysis 9.5.0.0
Ibm Emptoris Spend Analysis 9.5.0.1
Ibm Emptoris Spend Analysis 10.0.1.1
Ibm Emptoris Spend Analysis 10.0.1.2
Ibm Emptoris Sourcing Portfolio 10.0.1.0
Ibm Emptoris Sourcing Portfolio 10.0.0.0
Ibm Emptoris Sourcing Portfolio 10.0.2.3
Ibm Emptoris Sourcing Portfolio 9.5.1.2
Ibm Emptoris Sourcing Portfolio 9.5.1.1
Ibm Emptoris Sourcing Portfolio 9.5.1.0
Ibm Emptoris Sourcing Portfolio 10.0.1.2
Ibm Emptoris Sourcing Portfolio 10.0.1.1
Ibm Emptoris Sourcing Portfolio 9.5.0.0
Ibm Emptoris Sourcing Portfolio 10.0.2.2
Ibm Emptoris Sourcing Portfolio 10.0.2.0
Ibm Emptoris Sourcing Portfolio 9.5.0.2
Ibm Emptoris Sourcing Portfolio 9.5.0.1
3.5
CVSSv2
CVE-2014-3033
Cross-site scripting (XSS) vulnerability in IBM Emptoris Sourcing Portfolio 9.5.x prior to 9.5.1.3, 10.0.0.x prior to 10.0.0.1, 10.0.1.x prior to 10.0.1.3, and 10.0.2.x prior to 10.0.2.4 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Ibm Emptoris Sourcing Portfolio 10.0.1.1
Ibm Emptoris Sourcing Portfolio 10.0.1.0
Ibm Emptoris Sourcing Portfolio 10.0.0.0
Ibm Emptoris Sourcing Portfolio 9.5.1.2
Ibm Emptoris Sourcing Portfolio 10.0.2.0
Ibm Emptoris Sourcing Portfolio 10.0.1.2
Ibm Emptoris Sourcing Portfolio 9.5.0.1
Ibm Emptoris Sourcing Portfolio 9.5.0.0
Ibm Emptoris Sourcing Portfolio 10.0.2.3
Ibm Emptoris Sourcing Portfolio 10.0.2.2
Ibm Emptoris Sourcing Portfolio 9.5.1.1
Ibm Emptoris Sourcing Portfolio 9.5.1.0
Ibm Emptoris Sourcing Portfolio 9.5.0.2
6
CVSSv2
CVE-2014-3040
Cross-site request forgery (CSRF) vulnerability in IBM Emptoris Contract Management 9.5.x prior to 9.5.0.6 iFix 10, 10.0.0.x prior to 10.0.0.1 iFix 10, 10.0.1.x prior to 10.0.1.4, and 10.0.2.x prior to 10.0.2.2 iFix 2; Emptoris Sourcing Portfolio 9.5.x prior to 9.5.1.3, 10.0.0.x ...
Ibm Emptoris Spend Analysis 10.0.0.1
Ibm Emptoris Spend Analysis 10.0.0.0
Ibm Emptoris Spend Analysis 10.0.2.0
Ibm Emptoris Spend Analysis 10.0.1.2
Ibm Emptoris Spend Analysis 9.5.0.1
Ibm Emptoris Spend Analysis 9.5.0.0
Ibm Emptoris Spend Analysis 10.0.2.2
Ibm Emptoris Spend Analysis 9.5.0.3
Ibm Emptoris Spend Analysis 9.5.0.2
Ibm Emptoris Spend Analysis 10.0.1.1
Ibm Emptoris Spend Analysis 10.0.1.0
Ibm Emptoris Sourcing Portfolio 10.0.1.0
Ibm Emptoris Sourcing Portfolio 10.0.0.0
Ibm Emptoris Sourcing Portfolio 10.0.1.2
Ibm Emptoris Sourcing Portfolio 10.0.1.1
Ibm Emptoris Sourcing Portfolio 9.5.0.0
Ibm Emptoris Sourcing Portfolio 10.0.2.2
Ibm Emptoris Sourcing Portfolio 10.0.2.0
Ibm Emptoris Sourcing Portfolio 9.5.1.0
Ibm Emptoris Sourcing Portfolio 9.5.0.2
Ibm Emptoris Sourcing Portfolio 9.5.0.1
Ibm Emptoris Sourcing Portfolio 10.0.2.3
4
CVSSv2
CVE-2014-6212
The Echo API in IBM Emptoris Contract Management 9.5.x prior to 9.5.0.6 iFix11, 10.0.0.x prior to 10.0.0.1 iFix12, 10.0.1.x prior to 10.0.1.5 iFix2, and 10.0.2.x prior to 10.0.2.2 iFix5; Emptoris Sourcing 9.5 prior to 9.5.1.3 iFix2, 10.0.0.x prior to 10.0.0.1 iFix1, 10.0.1.x prio...
Ibm Emptoris Sourcing Portfolio 9.5.0.0
Ibm Emptoris Sourcing Portfolio 10.0.0.0
Ibm Emptoris Sourcing Portfolio 10.0.0.1
Ibm Emptoris Sourcing Portfolio 10.0.2.4
Ibm Emptoris Sourcing Portfolio 9.5.1.0
Ibm Emptoris Sourcing Portfolio 9.5.1.1
Ibm Emptoris Sourcing Portfolio 10.0.1.3
Ibm Emptoris Sourcing Portfolio 10.0.2.0
Ibm Emptoris Sourcing Portfolio 9.5.0.1
Ibm Emptoris Sourcing Portfolio 9.5.0.2
Ibm Emptoris Sourcing Portfolio 10.0.1.0
Ibm Emptoris Sourcing Portfolio 10.0.1.1
Ibm Emptoris Sourcing Portfolio 10.0.1.2
Ibm Emptoris Sourcing Portfolio 9.5.1.2
Ibm Emptoris Sourcing Portfolio 9.5.1.3
Ibm Emptoris Sourcing Portfolio 10.0.2.2
Ibm Emptoris Sourcing Portfolio 10.0.2.3
Ibm Emptoris Program Management 10.0.1.2
Ibm Emptoris Program Management 10.0.1.3
Ibm Emptoris Program Management 10.0.0.2
Ibm Emptoris Program Management 10.0.0.3
Ibm Emptoris Program Management 10.0.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started