Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
connections vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2016-0308
IBM Connections 5.5 and previous versions is vulnerable to possible link manipulation attack that could result in the display of inappropriate background images.
Ibm Connections 5.0.0.0
Ibm Connections 4.5.0.0
Ibm Connections 5.5.0.0
Ibm Connections 4.0.0.0
NA
CVE-2009-2010
Multiple SQL injection vulnerabilities in Haudenschilt Family Connections CMS (FCMS) 1.9 and previous versions allow remote authenticated users to execute arbitrary SQL commands via the (1) thread parameter to messageboard.php, (2) member parameter to profile.php, (3) pid paramet...
Haudenschilt Family Connections Cms
Haudenschilt Family Connections Cms 1.4
Haudenschilt Family Connections Cms 0.1.2
Haudenschilt Family Connections Cms 1.8.1
Haudenschilt Family Connections Cms 0.5
Haudenschilt Family Connections Cms 0.1.1
Haudenschilt Family Connections Cms 0.9
Haudenschilt Family Connections Cms 1.8.2
Haudenschilt Family Connections Cms 0.8
Haudenschilt Family Connections Cms 0.6
1 EDB exploit
NA
CVE-2011-5130
dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote malicious users to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
Haudenschilt Family Connections Cms 2.5.2
Haudenschilt Family Connections Cms 2.5.3
Haudenschilt Family Connections Cms 2.5.4
Haudenschilt Family Connections Cms 2.6.0
Haudenschilt Family Connections Cms 2.7.0
Haudenschilt Family Connections Cms 2.7.1
Haudenschilt Family Connections Cms 2.5.0
Haudenschilt Family Connections Cms 2.5.1
2 EDB exploits
3.7
CVSSv3
CVE-2016-2953
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 does not require SSL, which allows remote malicious users to obtain sensitive cleartext information by sniffing the network.
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
Ibm Connections 4.5.0.0
4.3
CVSSv3
CVE-2016-2957
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows remote authenticated users to obtain sensitive information by reading a stack trace in a response.
Ibm Connections 4.5.0.0
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
4.9
CVSSv3
CVE-2018-1791
IBM Connections 5.0, 5.5, and 6.0 is vulnerable to an External Service Interaction attack, caused by improper validation of a request property. By submitting suitable payloads, an attacker could exploit this vulnerability to induce the Connections server to attack other systems. ...
Ibm Connections 6.0
Ibm Connections 5.5
Ibm Connections 5.0
4.3
CVSSv3
CVE-2016-2958
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows remote authenticated users to obtain sensitive information by reading an "archaic" e-mail address in a response.
Ibm Connections 4.5.0.0
Ibm Connections 4.0.0.0
Ibm Connections 5.0.0.0
2.1
CVSSv3
CVE-2016-3002
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows physically proximate malicious users to obtain sensitive information by reading cached data on a client device.
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
Ibm Connections 4.5.0.0
4.3
CVSSv3
CVE-2018-1935
IBM Connections 5.0, 5.5, and 6.0 could allow an authenticated user to obtain sensitive information from invalid request error messages. IBM X-Force ID: 153315.
Ibm Connections 5.0
Ibm Connections 5.5
Ibm Connections 6.0
6.1
CVSSv3
CVE-2017-1748
IBM Connections 5.0, 5.5, and 6.0 could allow a remote malicious user to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirec...
Ibm Connections 5.0.0.0
Ibm Connections 6.0
Ibm Connections 5.5.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »