Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
access vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2020-7674
access-policy up to and including 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution.
Access-policy Project Access-policy
7.2
CVSSv2
CVE-2006-0561
Cisco Secure Access Control Server (ACS) 3.x for Windows stores ACS administrator passwords and the master key in the registry with insecure permissions, which allows local users and remote administrators to decrypt the passwords by using Microsoft's cryptographic API functi...
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 3.1.1
Cisco Secure Access Control Server 3.1
Cisco Secure Access Control Server 3.2
Cisco Secure Access Control Server 3.0.1
Cisco Secure Access Control Server 3.0.3
Cisco Secure Access Control Server 3.3
4.4
CVSSv2
CVE-2022-28714
On F5 BIG-IP APM 16.1.x versions before 16.1.2.2, 15.1.x versions before 15.1.5.1, 14.1.x versions before 14.1.4.6, 13.1.x versions before 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions before 7.2.1.5, a DLL Hijacking vulnerability ex...
F5 Big-ip Access Policy Manager 12.1.2
F5 Big-ip Access Policy Manager 12.1.1
F5 Big-ip Access Policy Manager 12.1.0
F5 Big-ip Access Policy Manager 11.6.1
F5 Big-ip Access Policy Manager 13.1.0
F5 Big-ip Access Policy Manager Client 7.1.7
F5 Big-ip Access Policy Manager Client 7.1.6
F5 Big-ip Access Policy Manager Client 7.1.6.1
F5 Big-ip Access Policy Manager 14.1.0
F5 Big-ip Access Policy Manager 15.1.0
F5 Big-ip Access Policy Manager 12.1.4
F5 Big-ip Access Policy Manager 12.1.5
F5 Big-ip Access Policy Manager 12.1.6
F5 Big-ip Access Policy Manager 13.1.1
F5 Big-ip Access Policy Manager 13.1.3
F5 Big-ip Access Policy Manager 13.1.4
F5 Big-ip Access Policy Manager 13.1.5
F5 Big-ip Access Policy Manager 14.1.2
F5 Big-ip Access Policy Manager 14.1.3
F5 Big-ip Access Policy Manager 14.1.4
F5 Big-ip Access Policy Manager 15.1.1
F5 Big-ip Access Policy Manager 15.1.2
5.8
CVSSv2
CVE-2022-22311
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Ibm Security Verify Access 10.0.0
Ibm Security Verify Access 10.0.1
Ibm Security Verify Access 10.0.2
Ibm Security Verify Access 10.0.3
3.5
CVSSv2
CVE-2022-22370
IBM Security Verify Access 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure wit...
Ibm Security Verify Access 10.0.1.0
Ibm Security Verify Access 10.0.2.0
Ibm Security Verify Access 10.0.0.0
Ibm Security Verify Access 10.0.3.0
6.4
CVSSv2
CVE-2022-22463
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database...
Ibm Security Verify Access 10.0.1.0
Ibm Security Verify Access 10.0.2.0
Ibm Security Verify Access 10.0.0.0
Ibm Security Verify Access 10.0.3.0
5
CVSSv2
CVE-2022-22464
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 225081.
Ibm Security Verify Access 10.0.1.0
Ibm Security Verify Access 10.0.2.0
Ibm Security Verify Access 10.0.0.0
Ibm Security Verify Access 10.0.3.0
4.6
CVSSv2
CVE-2022-22465
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 could allow a local user to obtain elevated privileges due to improper access permissions. IBM X-Force ID: 225082.
Ibm Security Verify Access 10.0.1.0
Ibm Security Verify Access 10.0.2.0
Ibm Security Verify Access 10.0.0.0
Ibm Security Verify Access 10.0.3.0
10
CVSSv2
CVE-2000-0762
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote malicious users to spoof the eTrust administrator and gain privileges.
Ca Etrust Access Control 5.0
Ca Etrust Access Control 4.1
Broadcom Etrust Access Control 4.1
Broadcom Etrust Access Control 5.0
7.5
CVSSv2
CVE-2004-0709
HP OpenView Select Access 5.0 up to and including 6.0 does not correctly decode UTF-8 encoded unicode characters in a URL, which could allow remote malicious users to bypass access restrictions.
Hp Openview Select Access 6.0
Hp Openview Select Access 5.0
Hp Openview Select Access 5.1
Hp Openview Select Access 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »