Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
crm vulnerabilities and exploits
(subscribe to this query)
4.7
CVSSv3
CVE-2019-2669
Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attac...
Oracle Crm Technical Foundation 12.1.3
Oracle Crm Technical Foundation 12.2.3
Oracle Crm Technical Foundation 12.2.5
Oracle Crm Technical Foundation 12.2.4
Oracle Crm Technical Foundation 12.2.6
Oracle Crm Technical Foundation 12.2.7
Oracle Crm Technical Foundation 12.2.8
8.2
CVSSv3
CVE-2019-2671
Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attac...
Oracle Crm Technical Foundation 12.1.3
Oracle Crm Technical Foundation 12.2.3
Oracle Crm Technical Foundation 12.2.5
Oracle Crm Technical Foundation 12.2.4
Oracle Crm Technical Foundation 12.2.6
Oracle Crm Technical Foundation 12.2.7
Oracle Crm Technical Foundation 12.2.8
NA
CVE-2014-5441
Multiple cross-site scripting (XSS) vulnerabilities in app/views/layouts/application.html.haml in Fat Free CRM prior to 0.13.3 allow remote malicious users to inject arbitrary web script or HTML via the (1) username, (2) first name, or (3) last name in a (a) create or (b) edit us...
Fatfreecrm Fat Free Crm 0.12.1
Fatfreecrm Fat Free Crm
Fatfreecrm Fat Free Crm 0.12.0
Fatfreecrm Fat Free Crm 0.11.1
Fatfreecrm Fat Free Crm 0.11.4
Fatfreecrm Fat Free Crm 0.11.2
NA
CVE-2016-0532
Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 11.5.10.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote malicious users to affect confidentiality and integrity via unknown vectors related to Security Assignments.
Oracle Crm Technical Foundation 12.1.3
Oracle Crm Technical Foundation 12.2.3
Oracle Crm Technical Foundation 12.2.5
Oracle Crm Technical Foundation 11.5.10.2
Oracle Crm Technical Foundation 12.2.4
8.8
CVSSv3
CVE-2019-14765
Incorrect Access Control in AfficheExplorateurParam() in DIMO YellowBox CRM prior to 6.3.4 allows a standard authenticated user to use administrative controllers.
Dimo-crm Yellowbox Crm
7.5
CVSSv3
CVE-2019-14767
In DIMO YellowBox CRM prior to 6.3.4, Path Traversal in images/Apparence (dossier=../) and servletrecuperefichier (document=../) allows an unauthenticated user to download arbitrary files from the server.
Dimo-crm Yellowbox Crm
6.5
CVSSv3
CVE-2019-14766
Path Traversal in the file browser of DIMO YellowBox CRM prior to 6.3.4 allows a standard authenticated user to browse the server filesystem.
Dimo-crm Yellowbox Crm
8.8
CVSSv3
CVE-2019-14768
An Arbitrary File Upload issue in the file browser of DIMO YellowBox CRM prior to 6.3.4 allows a standard authenticated user to deploy a new WebApp WAR file to the Tomcat server via Path Traversal, allowing remote code execution with SYSTEM privileges.
Dimo-crm Yellowbox Crm
NA
CVE-2015-2587
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, and 15.0 allows remote malicious users to affect integrity via vectors related to SWSE Server Infrastructure.
Oracle Siebel Crm 15.0
Oracle Siebel Crm 8.1.1
Oracle Siebel Crm 8.2.2
NA
CVE-2015-2600
Unspecified vulnerability in the Siebel Core - Server OM Svcs component in Oracle Siebel CRM 8.1.1, 8.2.2, and 15.0 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
Oracle Siebel Crm 15.0
Oracle Siebel Crm 8.1.1
Oracle Siebel Crm 8.2.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »