Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
connections vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2016-3010
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016...
Ibm Connections 4.0.0.0
Ibm Connections 5.5.0.0
Ibm Connections 5.0.0.0
Ibm Connections 4.5.0.0
6.5
CVSSv2
CVE-2009-2010
Multiple SQL injection vulnerabilities in Haudenschilt Family Connections CMS (FCMS) 1.9 and previous versions allow remote authenticated users to execute arbitrary SQL commands via the (1) thread parameter to messageboard.php, (2) member parameter to profile.php, (3) pid paramet...
Haudenschilt Family Connections Cms
Haudenschilt Family Connections Cms 1.4
Haudenschilt Family Connections Cms 0.1.2
Haudenschilt Family Connections Cms 1.8.1
Haudenschilt Family Connections Cms 0.5
Haudenschilt Family Connections Cms 0.1.1
Haudenschilt Family Connections Cms 0.9
Haudenschilt Family Connections Cms 1.8.2
Haudenschilt Family Connections Cms 0.8
Haudenschilt Family Connections Cms 0.6
1 EDB exploit
6.8
CVSSv2
CVE-2011-5130
dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote malicious users to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
Haudenschilt Family Connections Cms 2.5.2
Haudenschilt Family Connections Cms 2.5.3
Haudenschilt Family Connections Cms 2.5.4
Haudenschilt Family Connections Cms 2.6.0
Haudenschilt Family Connections Cms 2.7.0
Haudenschilt Family Connections Cms 2.7.1
Haudenschilt Family Connections Cms 2.5.0
Haudenschilt Family Connections Cms 2.5.1
2 EDB exploits
4.3
CVSSv2
CVE-2016-2953
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 does not require SSL, which allows remote malicious users to obtain sensitive cleartext information by sniffing the network.
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
Ibm Connections 4.5.0.0
4
CVSSv2
CVE-2016-2957
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows remote authenticated users to obtain sensitive information by reading a stack trace in a response.
Ibm Connections 4.5.0.0
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
4
CVSSv2
CVE-2016-2958
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows remote authenticated users to obtain sensitive information by reading an "archaic" e-mail address in a response.
Ibm Connections 4.5.0.0
Ibm Connections 4.0.0.0
Ibm Connections 5.0.0.0
2.1
CVSSv2
CVE-2016-3002
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows physically proximate malicious users to obtain sensitive information by reading cached data on a client device.
Ibm Connections 5.0.0.0
Ibm Connections 4.0.0.0
Ibm Connections 4.5.0.0
3.5
CVSSv2
CVE-2020-4084
HCL Connections v5.5, v6.0, and v6.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Hcltech Connections 5.5
Hcltech Connections 6.0
Hcltech Connections 6.5
4
CVSSv2
CVE-2020-4085
"HCL Connections is vulnerable to possible information leakage and could disclose sensitive information via stack trace to a local user."
Hcltech Connections 5.5
Hcltech Connections 6.0
Hcltech Connections 6.5
5.8
CVSSv2
CVE-2019-4209
HCL Connections v5.5, v6.0, and v6.5 contains an open redirect vulnerability which could be exploited by an malicious user to conduct phishing attacks.
Hcltech Connections 5.5
Hcltech Connections 6.0
Hcltech Connections 6.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »