Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm http server vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2018-1721
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or cause the web server to make HTTP requests to arbitrary domains. IBM X-...
Ibm Cognos Analytics 11.0.0
Ibm Cognos Analytics 11.1.0
6.4
CVSSv2
CVE-2020-4471
IBM Spectrum Protect Plus 10.1.0 up to and including 10.1.5 could allow an unauthenticated malicious user to cause a denial of service or hijack DNS sessions by send a specially crafted HTTP command to the remote server. IBM X-Force ID: 181726.
Ibm Spectrum Protect Plus
6.4
CVSSv2
CVE-2012-0502
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and previous versions, 6 Update 30 and previous versions, 5.0 Update 33 and previous versions, and 1.4.2_35 and previous versions allows remote untrusted Java Web Start applicat...
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 11
Sun Jre 1.4.2 18
Sun Jre 1.4.2 14
Sun Jre 1.4.2 9
Sun Jre 1.4.2 8
Sun Jre 1.4.2 28
Sun Jre 1.4.2 29
Sun Jre 1.4.2 12
Sun Jre 1.4.2 31
Sun Jre 1.4.2 1
Sun Jre 1.4.2 23
Sun Jre 1.4.2 15
6.4
CVSSv2
CVE-2011-3563
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and previous versions, 6 Update 30 and previous versions, 5.0 Update 33 and previous versions, and 1.4.2_35 and previous versions allows remote malicious users to affect confide...
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 12
Sun Jre 1.4.2 15
Sun Jre 1.4.2 17
Sun Jre 1.4.2 1
Sun Jre 1.4.2 23
Sun Jre 1.4.2 32
Sun Jre 1.4.2 14
Sun Jre 1.4.2 8
Sun Jre 1.4.2 29
Sun Jre 1.4.2
Sun Jre 1.4.2 11
Sun Jre 1.4.2 18
6.4
CVSSv2
CVE-2004-0493
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote malicious users to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large number...
Trustix Secure Linux 2.0
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Gentoo Linux 1.4
Trustix Secure Linux 2.1
Apache Http Server 2.0.47
Ibm Http Server 2.0.42.1
Avaya S8300 R2.0.0
Apache Http Server 2.0.49
Ibm Http Server 2.0.42
Ibm Http Server 2.0.47.1
Apache Http Server 2.0.48
Ibm Http Server 2.0.42.2
Avaya S8700 R2.0.0
Avaya S8500 R2.0.0
Ibm Http Server 2.0.47
2 EDB exploits
6
CVSSv2
CVE-2020-4434
Certain IBM Aspera applications are vulnerable to buffer overflow based on the product configuration and valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code or perform a denial-of-service (DoS) through the http fallb...
Ibm Aspera Application Platform On Demand
Ibm Aspera Faspex On Demand
Ibm Aspera High-speed Transfer Endpoint
Ibm Aspera High-speed Transfer Server
Ibm Aspera High-speed Transfer Server For Cloud Pak For Integration
Ibm Aspera Proxy Server
Ibm Aspera Server On Demand
Ibm Aspera Shares On Demand
Ibm Aspera Streaming
Ibm Aspera Transfer Cluster Manager
6
CVSSv2
CVE-2020-4435
Certain IBM Aspera applications are vulnerable to arbitrary memory corruption based on the product configuration, which could allow an attacker with intimate knowledge of the system to execute arbitrary code or perform a denial-of-service (DoS) through the http fallback service. ...
Ibm Aspera Application Platform On Demand
Ibm Aspera Faspex On Demand
Ibm Aspera High-speed Transfer Endpoint
Ibm Aspera High-speed Transfer Server
Ibm Aspera High-speed Transfer Server For Cloud Pak For Integration
Ibm Aspera Proxy Server
Ibm Aspera Server On Demand
Ibm Aspera Shares On Demand
Ibm Aspera Streaming
Ibm Aspera Transfer Cluster Manager
6
CVSSv2
CVE-2012-1843
Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote malicious users to hij...
Quantum Scalar I500 Firmware I7.0.1
Quantum Scalar I500 Firmware I7
Quantum Scalar I500 Firmware I3
Quantum Scalar I500 Firmware Sp4.2
Quantum Scalar I500 Firmware I6.1
Quantum Scalar I500 Firmware I6
Quantum Scalar I500 Firmware Sp4
Quantum Scalar I500 Firmware I2
Quantum Scalar I500 Firmware I5.1
Quantum Scalar I500 Firmware I5
Quantum Scalar I500 Firmware
Quantum Scalar I500 Firmware I4
Quantum Scalar I500 Firmware I3.1
Quantum Scalar I500 14u
Quantum Scalar I500 23u
Quantum Scalar I500 5u
Dell Powervault Ml6000 Firmware 585g.gs003
Dell Powervault Ml6010 5u
Dell Powervault Ml6020 14u
Dell Powervault Ml6030 23u
Dell Powervault Ml6000 41u
Dell Powervault Ml6000 32u
5.8
CVSSv2
CVE-2019-4552
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This ...
Ibm Security Access Manager
Ibm Security Verify Access
5.8
CVSSv2
CVE-2020-8201
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an malicious user to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attac...
Nodejs Node.js
Opensuse Leap 15.2
Fedoraproject Fedora 33
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »