Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm powervc 1.2.0.0 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2014-4749
IBM PowerVC 1.2.0 before FixPack3 does not properly use the known_hosts file, which allows man-in-the-middle malicious users to spoof SSH servers via an arbitrary server key.
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
258
VMScore
CVE-2014-4750
IBM PowerVC Express Edition 1.2.0 before FixPack3 establishes an FTP session for transferring files to a managed IVM, which allows remote malicious users to discover credentials by sniffing the network.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
187
VMScore
CVE-2014-3093
IBM PowerVC 1.2.0 before FP3 and 1.2.1 before FP2 uses cleartext passwords in (1) api-paste.ini, (2) debug logs, (3) the installation process, (4) environment checks, (5) powervc-ldap-config, (6) powervc-restore, and (7) powervc-diag, which allows local users to obtain sensitive ...
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.1.0
187
VMScore
CVE-2015-0136
powervc-iso-import in IBM PowerVC 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 places an access token on the command line during IVM and PowerKVM management, which allows local users to obtain sensitive information by listing the process.
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
383
VMScore
CVE-2015-0137
IBM PowerVC Standard 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 validates Hardware Management Console (HMC) certificates only during the pre-login stage, which allows man-in-the-middle malicious users to spoof devices via a crafted certificate.
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
668
VMScore
CVE-2015-1937
IBM PowerVC 1.2.0.x up to and including 1.2.0.4, 1.2.1.x up to and including 1.2.1.2, and 1.2.2.x up to and including 1.2.2.2 does not require authentication for the ceilometer NoSQL database, which allows remote malicious users to read or write to arbitrary database records, and...
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.0.4
Ibm Powervc 1.2.2.0
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.1.2
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.2.1
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started