Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opentext exceed ondemand 8.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-6807
The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by default, which allows man-in-the-middle malicious users to bypass server certificate validation, redirect a connection, and obtain sensitive information via crafted responses.
Opentext Exceed Ondemand 8.0
1 Github repository
NA
CVE-2013-6994
OpenText Exceed OnDemand (EoD) 8 transmits the session ID in cleartext, which allows remote malicious users to perform session fixation attacks by sniffing the network.
Opentext Exceed Ondemand 8.0
1 Github repository
NA
CVE-2013-6805
OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes it easier for (1) remote malicious users to discover credentials by sniffing the network or (2) local users to discover credentials by reading a .eod8 file.
Opentext Exceed Ondemand 8.0
1 Github repository
NA
CVE-2013-6806
OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle malicious users to disable bidirectional authentication and obtain sensitive information via a crafted string in a response, which triggers a downgrade to simple authentication that sends credentials in plaintext.
Opentext Exceed Ondemand 8.0
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started