Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
disclosure management vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2018-17871
Verba Collaboration Compliance and Quality Management Platform prior to 9.2.1.5545 has Incorrect Access Control.
Verint Verba Collaboration Compliance And Quality Management Platform
9.4
CVSSv2
CVE-2007-3191
Just For Fun Network Management System (JFFNMS) 0.8.3 allows remote malicious users to obtain configuration information via a direct request to admin/adm/test.php, which calls the phpinfo function.
Jffnms Just For Fun Network Management System 0.8.3
1 EDB exploit
4
CVSSv2
CVE-2020-11840
Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product, Affecting versions 2.6.1, 2.7.x, 2.8.x, 2.9.x before 2.9.4. The vulnerabilities could be remotely exploited resulting unauthorized information disclosure.
Microfocus Arcsight Management Center
Microfocus Arcsight Management Center 2.6.1
4
CVSSv2
CVE-2020-11841
Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product, Affecting versions 2.6.1, 2.7.x, 2.8.x, 2.9.x before 2.9.4. The vulnerabilities could be remotely exploited resulting unauthorized information disclosure.
Microfocus Arcsight Management Center
Microfocus Arcsight Management Center 2.6.1
4.3
CVSSv2
CVE-2017-1355
IBM Atlas eDiscovery Process Management 6.0.3 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 126682.
Ibm Atlas Ediscovery Process Management 6.0.3.3
Ibm Atlas Ediscovery Process Management 6.0.3.5
Ibm Atlas Ediscovery Process Management 6.0.3
Ibm Atlas Ediscovery Process Management 6.0.3.2
Ibm Atlas Ediscovery Process Management 6.0.3.4
3.5
CVSSv2
CVE-2017-1354
IBM Atlas eDiscovery Process Management 6.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. I...
Ibm Atlas Ediscovery Process Management 6.0.3
Ibm Atlas Ediscovery Process Management 6.0.3.2
Ibm Atlas Ediscovery Process Management 6.0.3.3
Ibm Atlas Ediscovery Process Management 6.0.3.4
Ibm Atlas Ediscovery Process Management 6.0.3.5
4.3
CVSSv2
CVE-2021-20554
IBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session...
Ibm Sterling Order Management 9.4.0
Ibm Sterling Order Management 9.5.0
Ibm Sterling Order Management 10
4.3
CVSSv2
CVE-2020-28859
OpenAsset Digital Asset Management (DAM) up to and including 12.0.19 does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for reflected cross-site scripting attacks.
Openasset Digital Asset Management
6.8
CVSSv2
CVE-2019-11946
A remote credential disclosure vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
Hp Intelligent Management Center 7.3
Hp Intelligent Management Center
5
CVSSv2
CVE-2018-0425
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote malicious user to gain access to sensitive informatio...
Cisco Rv110w Firmware
Cisco Rv130w Firmware
Cisco Rv215w Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »