Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
process integration vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-0282
Several web pages in SAP NetWeaver Process Integration (Runtime Workbench), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; can be accessed without user authentication, which might expose internal data like release information, Java package and Java object names which can...
Sap Netweaver Process Integration 7.10
Sap Netweaver Process Integration 7.11
Sap Netweaver Process Integration 7.30
Sap Netweaver Process Integration 7.31
Sap Netweaver Process Integration 7.40
Sap Netweaver Process Integration 7.50
5.5
CVSSv2
CVE-2019-0283
SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be ac...
Sap Netweaver Process Integration 7.10
Sap Netweaver Process Integration 7.11
Sap Netweaver Process Integration 7.30
Sap Netweaver Process Integration 7.40
Sap Netweaver Process Integration 7.31
Sap Netweaver Process Integration 7.50
3.5
CVSSv2
CVE-2017-16789
Cross-site scripting (XSS) vulnerability in Integration Matters nJAMS 3 prior to 3.2.0 Hotfix 7, as used in TIBCO BusinessWorks Process Monitor up to and including 3.0.1.3 and other products, allows remote authenticated administrators to inject arbitrary web script or HTML via th...
Integrationmatters Njams 3
Tibco Businessworks Process Monitor
5
CVSSv2
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL up to and including 1.0.2h allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a cr...
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.1r
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.2h
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.1t
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.1p
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1n
Openssl Openssl 1.0.1q
Openssl Openssl 1.0.1e
Openssl Openssl 1.0.1l
6.4
CVSSv2
CVE-2016-2176
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL prior to 1.0.1t and 1.0.2 prior to 1.0.2h allows remote malicious users to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl
Openssl Openssl 1.0.2f
Openssl Openssl 1.0.2d
1 Article
2.6
CVSSv2
CVE-2016-0701
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 prior to 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote malicious users to discover a private DH exponent by making multiple ha...
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
1 Article
3.5
CVSSv2
CVE-2015-1904
IBM Business Process Manager (BPM) 8.0.x up to and including 8.0.1.3, 8.5.0 up to and including 8.5.0.1, 8.5.5 up to and including 8.5.5.0, and 8.5.6 up to and including 8.5.6.0, when external Enterprise Content Management (ECM) integration is enabled with a certain technical sys...
Ibm Business Process Manager 8.0.0.0
Ibm Business Process Manager 8.0.1.0
Ibm Business Process Manager 8.0.1.2
Ibm Business Process Manager 8.5.0.1
Ibm Business Process Manager 8.0.1.1
Ibm Business Process Manager 8.0.1.3
Ibm Business Process Manager 8.5.0.0
Ibm Business Process Manager 8.5.5.0
Ibm Business Process Manager 8.5.6.0
4.3
CVSSv2
CVE-2015-1788
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL prior to 0.9.8s, 1.0.0 prior to 1.0.0e, 1.0.1 prior to 1.0.1n, and 1.0.2 prior to 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows re...
Openssl Openssl
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.1
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
1 Article
7.1
CVSSv2
CVE-2015-0612
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 prior to 8.5(1)SU6, 8.6 prior to 8.6(2a)SU4, and 9.x prior to 9.1(2)SU2, when SIP trunk integration is enabled, allows remote malicious users to cause a denial of service (SIP outage) via a cr...
Cisco Unity Connection 8.5 Base
Cisco Unity Connection 8.6 Base
Cisco Unity Connection 9.0\\(1\\)
Cisco Unity Connection 9.1\\(1\\)
Cisco Unity Connection 8.5\\(1\\)su4
Cisco Unity Connection 8.5\\(1\\)su5
Cisco Unity Connection 8.6\\(2a\\)
Cisco Unity Connection 8.6\\(2a\\)su1
Cisco Unity Connection 8.6\\(2a\\)su2
Cisco Unity Connection 8.6\\(2a\\)su3
Cisco Unity Connection 9.1\\(2\\)
Cisco Unity Connection 8.6\\(1a\\)
Cisco Unity Connection 8.5\\(1\\)su1
Cisco Unity Connection 8.5\\(1\\)su3
Cisco Unity Connection 8.6\\(1\\)
Cisco Unity Connection 8.6\\(2\\)
Cisco Unity Connection 8.5\\(1\\)
Cisco Unity Connection 8.5\\(1\\)su2
7.1
CVSSv2
CVE-2015-0613
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, 9.x prior to 9.1(2)SU2, and 10.0 prior to 10.0(1)SU1, when SIP trunk integration is enabled, allows remote malicious users to cause a denial of ser...
Cisco Unity Connection 8.6\\(1\\)
Cisco Unity Connection 8.6\\(1a\\)
Cisco Unity Connection 8.6\\(2\\)
Cisco Unity Connection 8.6\\(2a\\)
Cisco Unity Connection 8.6 Base
Cisco Unity Connection 8.5\\(1\\)su1
Cisco Unity Connection 8.5\\(1\\)su2
Cisco Unity Connection 8.5\\(1\\)su3
Cisco Unity Connection 8.5\\(1\\)su4
Cisco Unity Connection 8.5\\(1\\)su5
Cisco Unity Connection 8.5 Base
Cisco Unity Connection 9.1\\(1\\)
Cisco Unity Connection 8.6\\(2a\\)su2
Cisco Unity Connection 8.5\\(1\\)
Cisco Unity Connection 10.0.5
Cisco Unity Connection 9.0\\(1\\)
Cisco Unity Connection 9.1\\(2\\)
Cisco Unity Connection 8.6\\(2a\\)su1
Cisco Unity Connection 8.6\\(2a\\)su3
Cisco Unity Connection 8.5\\(1\\)su6
Cisco Unity Connection 10.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »