Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm powervc 1.2.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4749
IBM PowerVC 1.2.0 before FixPack3 does not properly use the known_hosts file, which allows man-in-the-middle malicious users to spoof SSH servers via an arbitrary server key.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
NA
CVE-2014-4750
IBM PowerVC Express Edition 1.2.0 before FixPack3 establishes an FTP session for transferring files to a managed IVM, which allows remote malicious users to discover credentials by sniffing the network.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
NA
CVE-2014-3093
IBM PowerVC 1.2.0 before FP3 and 1.2.1 before FP2 uses cleartext passwords in (1) api-paste.ini, (2) debug logs, (3) the installation process, (4) environment checks, (5) powervc-ldap-config, (6) powervc-restore, and (7) powervc-diag, which allows local users to obtain sensitive ...
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
NA
CVE-2015-0136
powervc-iso-import in IBM PowerVC 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 places an access token on the command line during IVM and PowerKVM management, which allows local users to obtain sensitive information by listing the process.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
NA
CVE-2015-0137
IBM PowerVC Standard 1.2.0.x prior to 1.2.0.4 and 1.2.1.x prior to 1.2.2 validates Hardware Management Console (HMC) certificates only during the pre-login stage, which allows man-in-the-middle malicious users to spoof devices via a crafted certificate.
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.3
NA
CVE-2015-1937
IBM PowerVC 1.2.0.x up to and including 1.2.0.4, 1.2.1.x up to and including 1.2.1.2, and 1.2.2.x up to and including 1.2.2.2 does not require authentication for the ceilometer NoSQL database, which allows remote malicious users to read or write to arbitrary database records, and...
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.1.0
Ibm Powervc 1.2.0.4
Ibm Powervc 1.2.0.3
Ibm Powervc 1.2.1.2
Ibm Powervc 1.2.2.0
Ibm Powervc 1.2.1.1
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.1
Ibm Powervc 1.2.2.2
Ibm Powervc 1.2.2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started