Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
workflow vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2020-26175
In tangro Business Workflow prior to 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
Tangro Business Workflow
5
CVSSv2
CVE-2020-26178
In tangro Business Workflow prior to 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
Tangro Business Workflow
NA
CVE-2022-38167
The Nintex Workflow plugin 5.2.2.30 for SharePoint allows XSS.
Nintex Workflow 5.2.2.30
5
CVSSv2
CVE-2020-4531
IBM Business Automation Workflow 18.0, 19.0, and 20.0 and IBM Business Process Manager 8.0, 8.5, and 8.6 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in furth...
Ibm Business Automation Workflow 18.0.0.0
Ibm Business Automation Workflow 19.0.0.0
Ibm Business Automation Workflow 20.0.0.0
Ibm Business Process Manager 8.0.0.0
Ibm Business Process Manager 8.5.0.0
Ibm Business Process Manager 8.6.0.0
4.3
CVSSv2
CVE-2008-1202
Cross-site scripting (XSS) vulnerability in the web management interface in Adobe LiveCycle Workflow 6.2 allows remote malicious users to inject arbitrary web script or HTML via unknown vectors.
Adobe Livecycle Workflow 6.2
NA
CVE-2022-46664
A vulnerability has been identified in Mendix Workflow Commons (All versions < V2.4.0), Mendix Workflow Commons V2.1 (All versions < V2.1.4), Mendix Workflow Commons V2.3 (All versions < V2.3.2). Affected versions of the module improperly handle access control for some m...
Siemens Mendix Workflow Commons
9.3
CVSSv2
CVE-2016-1894
NetApp OnCommand Workflow Automation prior to 3.1P2 allows remote malicious users to bypass authentication via unspecified vectors.
Netapp Oncommand Workflow Automation
NA
CVE-2023-33457
In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , may cause buffer-overflow and crash.
Sogou C\\+\\+ Workflow 0.10.6
5.5
CVSSv2
CVE-2020-4794
IBM Automation Workstream Services 19.0.3, 20.0.1, 20.0.2, IBM Business Automation Workflow 18.0, 19.0, and 20.0 and IBM Business Process Manager 8.6 could allow an authenticated user to obtain sensitive information or cuase a denial of service due to iimproper authorization chec...
Ibm Automation Workstream Services 19.0.3
Ibm Automation Workstream Services 20.0.1
Ibm Automation Workstream Services 20.0.2
Ibm Business Process Manager 8.0.0.0
Ibm Business Process Manager 8.0.1.0
Ibm Business Process Manager 8.0.1.1
Ibm Business Process Manager 8.0.1.2
Ibm Business Process Manager 8.0.1.3
Ibm Business Process Manager 8.5.0.0
Ibm Business Process Manager 8.5.0.1
Ibm Business Process Manager 8.5.0.2
Ibm Business Process Manager 8.5.5.0
Ibm Business Process Manager 8.5.6.0
Ibm Business Process Manager 8.5.6.1
Ibm Business Process Manager 8.5.6.2
Ibm Business Process Manager 8.5.7.0
Ibm Business Process Manager 8.6
Ibm Business Automation Workflow 18.0.0.0
Ibm Business Automation Workflow 18.0.0.1
Ibm Business Automation Workflow 18.0.0.2
Ibm Business Automation Workflow 19.0.0.0
Ibm Business Automation Workflow 19.0.0.1
5
CVSSv2
CVE-2020-4532
IBM Business Automation Workflow and IBM Business Process Manager (IBM Business Process Manager Express 8.5.5, 8.5.6, 8.5.7, and 8.6) could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This infor...
Ibm Business Automation Workflow 18.0.0.1
Ibm Business Automation Workflow 19.0.0.3
Ibm Business Process Manager
Ibm Business Process Manager 8.6.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »