Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
control center vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2020-16212
In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. The application on the surveillance station operates in kiosk mode, which is vuln...
Philips Patient Information Center Ix B.02
Philips Patient Information Center Ix C.02
Philips Patient Information Center Ix C.03
2.7
CVSSv2
CVE-2020-16218
In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is then used as a webpage and served to other users. Successful exploitation could lead to un...
Philips Patient Information Center Ix B.02
Philips Patient Information Center Ix C.02
Philips Patient Information Center Ix C.03
5.8
CVSSv2
CVE-2020-16214
In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software saves user-provided information into a comma-separated value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is...
Philips Patient Information Center Ix B.02
Philips Patient Information Center Ix C.02
Philips Patient Information Center Ix C.03
6.1
CVSSv2
CVE-2016-3494
Unspecified vulnerability in the Enterprise Manager Ops Center component in Oracle Enterprise Manager Grid Control 12.1.4, 12.2.2, and 12.3.2 allows remote malicious users to affect availability via vectors related to OS Provisioning.
Oracle Enterprise Manager Ops Center 12.3.2
Oracle Enterprise Manager Ops Center 12.1.4
Oracle Enterprise Manager Ops Center 12.2.2
5
CVSSv2
CVE-2002-0160
The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and previous versions and 3.x up to and including 3.01 (build 40), allows remote malicious users to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in ...
Cisco Secure Access Control Server 2.6.2
Cisco Secure Access Control Server 2.6.3
Cisco Secure Access Control Server 2.6.4
Cisco Secure Access Control Server 2.6
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 3.0.1
7.5
CVSSv2
CVE-2002-0159
Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and previous versions and 3.x up to and including 3.01 (build 40), allows remote malicious users to crash the CSADMIN module only (denial of service of admini...
Cisco Secure Access Control Server 3.0.1
Cisco Secure Access Control Server 2.6.4
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 2.6
Cisco Secure Access Control Server 2.6.2
Cisco Secure Access Control Server 2.6.3
7.5
CVSSv2
CVE-2005-2631
Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote malicious users to bypass security checks, change the assigned role of a user, or disconnect users.
Cisco Network Admission Control Manager And Server System Software 3.3.3
Cisco Network Admission Control Manager And Server System Software 3.3.4
Cisco Network Admission Control Manager And Server System Software 3.4.1
Cisco Network Admission Control Manager And Server System Software 3.4.2
Cisco Network Admission Control Manager And Server System Software 3.4.3
Cisco Network Admission Control Manager And Server System Software 3.3
Cisco Network Admission Control Manager And Server System Software 3.3.7
Cisco Network Admission Control Manager And Server System Software 3.3.8
Cisco Network Admission Control Manager And Server System Software 3.5
Cisco Network Admission Control Manager And Server System Software 3.5.1
Cisco Network Admission Control Manager And Server System Software 3.3.5
Cisco Network Admission Control Manager And Server System Software 3.3.6
Cisco Network Admission Control Manager And Server System Software 3.4.4
Cisco Network Admission Control Manager And Server System Software 3.4.5
Cisco Network Admission Control Manager And Server System Software 3.3.1
Cisco Network Admission Control Manager And Server System Software 3.3.2
Cisco Network Admission Control Manager And Server System Software 3.3.9
Cisco Network Admission Control Manager And Server System Software 3.4
Cisco Network Admission Control Manager And Server System Software 3.5.2
Cisco Network Admission Control Manager And Server System Software 3.5.3
5
CVSSv2
CVE-2019-1832
A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit ...
Cisco Firepower Management Center 6.2.0.5
Cisco Firepower Management Center 6.2.3.1
Cisco Firepower Management Center 6.4.0
Cisco Firepower Management Center 6.2.0
Cisco Firepower Management Center 6.2.3
Cisco Firepower Management Center 6.2.3.2
4.3
CVSSv2
CVE-2019-4137
IBM Tivoli Storage Productivity Center 5.2.13 up to and including 5.3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure...
Ibm Spectrum Control
4.3
CVSSv2
CVE-2019-4138
IBM Tivoli Storage Productivity Center 5.2.13 up to and including 5.3.0.1 could allow a remote malicious user to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive...
Ibm Spectrum Control
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »