Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm algorithmics - vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2016-0207
IBM Algorithmics One-Algo Risk Application (ARA) 4.9.1 up to and including 5.1.0 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors. IBM X-Force ID: 109399.
Ibm Algo Risk Application
4
CVSSv2
CVE-2017-1154
IBM Algorithmics One-Algo Risk Application 4.9.1, 5.0, and 5.1.0 could allow a user to gain access to files in the local environment which should not be viewed by application users. IBM Reference #: 1999892.
Ibm Algo One 5.0.0
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
4
CVSSv2
CVE-2017-1155
IBM Algorithmics One-Algo Risk Application 4.9.1, 5.0, and 5.1.0 could allow a user to gain access to another user's reports using a specially crafted HTTP request. IBM Reference #: 1999754.
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
Ibm Algo One 5.0.0
3.5
CVSSv2
CVE-2016-0390
Cross-site scripting (XSS) vulnerability in IBM Algorithmics Algo One Algo Risk Application (ARA) 4.9.1 up to and including 5.1.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Ibm Algo One 5.0.0
Ibm Algo One 4.9.1
Ibm Algo One 5.1.0
4.9
CVSSv2
CVE-2014-0865
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via crafted serialized...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
5.8
CVSSv2
CVE-2014-0867
rcore6/main/addcookie.jsp in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allows remote malicious users to create or modify cookies via the query string.
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
4.3
CVSSv2
CVE-2014-0869
The decrypt function in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics does not require a key, which makes it easier for remote malicious users to obtain cleartext passwords by sniffing the network and then pro...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
4.3
CVSSv2
CVE-2014-0871
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allows remote malicious users to obtain potentially sensitive Tomcat stack-trace information via non-printing characters in a cookie to the /classes/ URI, as demon...
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
6.8
CVSSv2
CVE-2014-0864
Multiple cross-site request forgery (CSRF) vulnerabilities in Executer in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics allow remote malicious users to hijack the authentication of arbitrary users for requests...
Ibm Algo Credit Limits 4.7.0
Ibm Algo Credit Limits 4.5.0
1 EDB exploit
4.3
CVSSv2
CVE-2014-0866
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 up to and including 4.7.0 prior to 4.7.0.03 FP5 in IBM Algorithmics sends cleartext credentials over HTTP, which allows remote malicious users to obtain sensitive information by sniffing the network.
Ibm Algorithmics -
Ibm Algo Credit Limits 4.5.0
Ibm Algo Credit Limits 4.7.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »