Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
next next vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv2
CVE-2014-6735
The imagine Next bmobile (aka com.conduit.app_51c3c19581af465092327dd25591b224.app) application 1.7.10.243 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a craft...
Bmobile Imagine Next Bmobile 1.7.10.243
3.5
CVSSv2
CVE-2017-1678
IBM DOORS Next Generation (DNG/RRC) 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted se...
Ibm Rational Doors Next Generation
3.5
CVSSv2
CVE-2018-1422
IBM Jazz Foundation products (IBM Rational DOORS Next Generation 5.0 up to and including 5.0.2 and 6.0 up to and including 6.0.5) are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended fu...
Ibm Rational Doors Next Generation
3.5
CVSSv2
CVE-2018-1610
IBM Rational DOORS Next Generation 5.0 up to and including 5.0.2 and 6.0 up to and including 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading...
Ibm Rational Doors Next Generation
9.3
CVSSv2
CVE-2017-2265
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.4.1 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
9.3
CVSSv2
CVE-2017-2266
Untrusted search path vulnerability in Encrypted files in self-decryption format created by FileCapsule Deluxe Portable Ver.1.0.4.1 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
9.3
CVSSv2
CVE-2017-2267
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.5.1 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
9.3
CVSSv2
CVE-2017-2268
Untrusted search path vulnerability in Encrypted files in self-decryption format created by FileCapsule Deluxe Portable Ver.1.0.5.1 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
9.3
CVSSv2
CVE-2017-2269
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.2.0.9 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
9.3
CVSSv2
CVE-2017-2270
Untrusted search path vulnerability in Encrypted files in self-decryption format created by FileCapsule Deluxe Portable Ver.2.0.9 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Resume-next Filecapsule Deluxe Portable
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »