Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm algorithmics - vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2016-0207
IBM Algorithmics One-Algo Risk Application (ARA) 4.9.1 up to and including 5.1.0 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors. IBM X-Force ID: 109399.
Ibm Algo Risk Application
6.5
CVSSv3
CVE-2017-1154
IBM Algorithmics One-Algo Risk Application 4.9.1, 5.0, and 5.1.0 could allow a user to gain access to files in the local environment which should not be viewed by application users. IBM Reference #: 1999892.
Ibm Algo One 5.0.0
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
4.3
CVSSv3
CVE-2017-1155
IBM Algorithmics One-Algo Risk Application 4.9.1, 5.0, and 5.1.0 could allow a user to gain access to another user's reports using a specially crafted HTTP request. IBM Reference #: 1999754.
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
Ibm Algo One 5.0.0
5.4
CVSSv3
CVE-2016-0390
Cross-site scripting (XSS) vulnerability in IBM Algorithmics Algo One Algo Risk Application (ARA) 4.9.1 up to and including 5.1.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Ibm Algo One 5.0.0
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
NA
CVE-2014-0866
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics sends cleartext credentials over HTTP, which allows remote malicious users to obtain sensitive information by sniffing the network.
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
NA
CVE-2014-0864
Multiple cross-site request forgery (CSRF) vulnerabilities in Executer in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allow remote malicious users to hijack the authentication of arbitrary users for requests...
Ibm Algo Credit Limits 4.7.0
Ibm Algo Credit Limits 4.5.0
1 EDB exploit
NA
CVE-2014-0865
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via crafted serialized...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
NA
CVE-2014-0867
rcore6/main/addcookie.jsp in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allows remote malicious users to create or modify cookies via the query string.
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
NA
CVE-2014-0868
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via a crafted XML docu...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
NA
CVE-2014-0871
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allows remote malicious users to obtain potentially sensitive Tomcat stack-trace information via non-printing characters in a cookie to the /classes/ URI, as demon...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »