Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm maximo asset management 7.6.0.6 vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2018-1415
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID:...
Ibm Maximo Asset Management 7.6.0.5
Ibm Maximo Asset Management 7.6.0.6
Ibm Maximo Asset Management 7.6.0.7
Ibm Maximo Asset Management 7.6.0.8
4.3
CVSSv3
CVE-2017-1357
IBM Maximo Asset Management 7.5 and 7.6 could allow an authenticated user to manipulate work orders to forge emails which could be used to conduct further advanced attacks. IBM X-Force ID: 126684.
Ibm Maximo Asset Management Essentials 7.5.0.10
Ibm Maximo Asset Management Essentials 7.6.0.7
Ibm Maximo Asset Management Essentials 7.6.0.6
Ibm Maximo Asset Management Essentials 7.6.0.5
Ibm Maximo Asset Management 7.5.0.8
Ibm Maximo Asset Management 7.5.0.9
Ibm Maximo Asset Management 7.5.0.10
Ibm Maximo Asset Management 7.6.0.7
Ibm Maximo Asset Management Essentials 7.5.0.2
Ibm Maximo Asset Management Essentials 7.5.0.3
Ibm Maximo Asset Management Essentials 7.5.0.4
Ibm Maximo Asset Management Essentials 7.5.0.5
Ibm Maximo Asset Management Essentials 7.6.0.0
Ibm Maximo Asset Management 7.5.0.0
Ibm Maximo Asset Management 7.5.0.1
Ibm Maximo Asset Management 7.5.0.2
Ibm Maximo Asset Management 7.5.0.3
Ibm Maximo Asset Management 7.6.0.2
Ibm Maximo Asset Management 7.6.0.1
Ibm Maximo Asset Management 7.6.0.0
Ibm Maximo Asset Management Essentials 7.5.0.0
Ibm Maximo Asset Management Essentials 7.5.0.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started