Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
automation manager vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2016-5334
VMware Identity Manager 2.x prior to 2.7.1 and vRealize Automation 7.x prior to 7.2.0 allow remote malicious users to read /SAAS/WEB-INF and /SAAS/META-INF files via unspecified vectors.
Vmware Identity Manager
Vmware Vrealize Automation
7.2
CVSSv2
CVE-2016-5335
VMware Identity Manager 2.x prior to 2.7 and vRealize Automation 7.0.x prior to 7.1 allow local users to obtain root access via unspecified vectors.
Vmware Identity Manager
Vmware Vrealize Automation
4.3
CVSSv2
CVE-2014-0940
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Service Automation Manager 7.2.2.2 prior to 7.2.2.2-TIV-TSAM-LA0041 allow remote malicious users to inject arbitrary web script or HTML via vectors involving the (1) REST API or (2) Self Service UI.
Ibm Tivoli Service Automation Manager 7.2.2.2
4.3
CVSSv2
CVE-2018-1848
IBM Business Automation Workflow 18.0.0.0 and 18.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted s...
Ibm Business Process Manager 8.5.6.0
Ibm Business Process Manager 8.5.5.0
Ibm Business Process Manager
Ibm Business Process Manager 8.6.0.0
Ibm Business Process Manager 8.5.7.0
Ibm Business Automation Workflow 18.0.0.0
Ibm Websphere
Ibm Business Automation Workflow 18.0.0.1
6.8
CVSSv2
CVE-2018-2000
IBM Business Automation Workflow 18.0.0.0 and 18.0.0.1 is vulnerable to cross-site request forgery which could allow an malicious user to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 154890.
Ibm Business Automation Workflow 18.0.0.1
Ibm Business Automation Workflow 18.0.0.0
Ibm Business Process Manager 8.6.0.0
3.5
CVSSv2
CVE-2020-4768
IBM Case Manager 5.2 and 5.3 and IBM Business Automation Workflow 18.0, 19.0, and 20.0 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credenti...
Ibm Business Automation Workflow
Ibm Case Manager
1.2
CVSSv2
CVE-2019-2513
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell). Supported versions that are affected are 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromi...
Oracle Mysql
Netapp Snapcenter -
Netapp Storage Automation Store -
Netapp Oncommand Unified Manager
Netapp Oncommand Workflow Automation -
3.5
CVSSv2
CVE-2020-4530
IBM Business Automation Workflow C.D.0 and IBM Business Process Manager 8.0, 8.5, and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to crede...
Ibm Business Automation Workflow
Ibm Business Process Manager
Ibm Business Process Manager 8.6.0.0
4
CVSSv2
CVE-2020-4446
IBM Business Process Manager 8.0, 8.5, and 8.6 and IBM Business Automation Workflow 18.0 and 19.0 could allow a remote malicious user to bypass security restrictions, caused by the failure to perform insufficient authorization checks. IBM X-Force ID: 181126.
Ibm Business Automation Workflow
Ibm Business Process Manager
Ibm Business Process Manager 8.6.0.0
NA
CVE-2019-14841
A flaw was found in the RHDM, where an authenticated attacker can change their assigned role in the response header. This flaw allows an malicious user to gain admin privileges in the Business Central Console.
Redhat Decision Manager 7.0
Redhat Process Automation 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »