Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security access manager for mobile appliance vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2014-3073
Unspecified vulnerability in IBM Security Access Manager (ISAM) for Mobile 8.0 and IBM Security Access Manager for Web 7.0 and 8.0 allows remote malicious users to execute arbitrary code via unknown vectors.
Ibm Security Access Manager For Mobile Software 8.0
Ibm Security Access Manager For Web Appliance 8.0
Ibm Security Access Manager For Web Software 7.0
Ibm Security Access Manager For Web Appliance 7.0
Ibm Security Access Manager For Web Software 8.0
Ibm Security Access Manager For Mobile Appliance 8.0
712
VMScore
CVE-2014-3053
The Local Management Interface (LMI) in IBM Security Access Manager (ISAM) for Mobile 8.0 with firmware 8.0.0.0 up to and including 8.0.0.3 and IBM Security Access Manager for Web 7.0, and 8.0 with firmware 8.0.0.2 and 8.0.0.3, allows remote malicious users to bypass authenticati...
Ibm Security Access Manager For Web 8.0 Firmware 8.0.0.2
Ibm Security Access Manager For Web 8.0 Firmware 8.0.0.3
Ibm Security Access Manager For Web Appliance 8.0
Ibm Security Access Manager For Web Appliance 7.0
Ibm Security Access Manager For Web Software 8.0
Ibm Security Access Manager For Mobile Appliance 8.0
Ibm Security Access Manager For Web Appliance 8.0
Ibm Security Access Manager For Web Software 7.0
Ibm Security Access Manager For Mobile Software 8.0
516
VMScore
CVE-2017-1489
IBM Security Access Manager 6.1, 7.0, 8.0, and 9.0 e-community configurations may be affected by a redirect vulnerability. ECSSO Master Authentication can redirect to a server not participating in an e-community domain. IBM X-Force ID: 128687.
Ibm Tivoli Access Manager For E-business 6.1.0.4
Ibm Tivoli Access Manager For E-business 6.1.0.6
Ibm Tivoli Access Manager For E-business 6.1.0.13
Ibm Tivoli Access Manager For E-business 6.1.0.15
Ibm Tivoli Access Manager For E-business 6.1.0.22
Ibm Tivoli Access Manager For E-business 6.1.0.24
Ibm Tivoli Access Manager For E-business 6.1.0.29
Ibm Tivoli Access Manager For E-business 6.1.0.31
Ibm Tivoli Access Manager For E-business 6.1.0
Ibm Tivoli Access Manager For E-business 6.1.0.1
Ibm Tivoli Access Manager For E-business 6.1.0.2
Ibm Tivoli Access Manager For E-business 6.1.0.3
Ibm Tivoli Access Manager For E-business 6.1.0.16
Ibm Tivoli Access Manager For E-business 6.1.0.17
Ibm Tivoli Access Manager For E-business 6.1.0.18
Ibm Tivoli Access Manager For E-business 6.1.0.19
Ibm Tivoli Access Manager For E-business 6.1.0.20
Ibm Tivoli Access Manager For E-business 6.1.0.8
Ibm Tivoli Access Manager For E-business 6.1.0.9
Ibm Tivoli Access Manager For E-business 6.1.0.10
Ibm Tivoli Access Manager For E-business 6.1.0.11
Ibm Tivoli Access Manager For E-business 6.1.0.25
356
VMScore
CVE-2017-1480
IBM Security Access Manager Appliance 8.0.0 up to and including 8.0.1.6, and 9.0.0 up to and including 9.0.3.1 stores potentially sensitive information in log files that could be read by a remote user. IBM X-Force ID: 128617.
Ibm Security Access Manager
Ibm Security Access Manager For Web
Ibm Security Access Manager For Mobile
445
VMScore
CVE-2017-1474
IBM Security Access Manager Appliance 7.0.0, 8.0.0 up to and including 8.0.1.6, and 9.0.0 up to and including 9.0.3.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 128606.
Ibm Security Access Manager
Ibm Security Access Manager For Mobile
Ibm Security Access Manager For Web
383
VMScore
CVE-2017-1476
IBM Security Access Manager Appliance 7.0.0, 8.0.0 up to and including 8.0.1.6, and 9.0.0 up to and including 9.0.3.1 could allow a remote malicious user to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could ex...
Ibm Security Access Manager
Ibm Security Access Manager For Web
Ibm Security Access Manager For Mobile
NA
CVE-2023-20107
A vulnerability in the deterministic random bit generator (DRBG), also known as pseudorandom number generator (PRNG), in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco ASA 5506-X, ASA 5508-X, and ASA 5516-X Firewalls c...
Cisco Adaptive Security Appliance
Cisco Firepower Threat Defense
445
VMScore
CVE-2019-1715
A vulnerability in the Deterministic Random Bit Generator (DRBG), also known as Pseudorandom Number Generator (PRNG), used in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user t...
Cisco Firepower Threat Defense
Cisco Adaptive Security Appliance Device Manager
694
VMScore
CVE-2018-0231
A vulnerability in the Transport Layer Security (TLS) library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to trigger a reload of the affected device, resulting in a den...
Cisco Adaptive Security Appliance Software 9.8\\(1\\)
Cisco Adaptive Security Appliance Software 98.1\\(1.154\\)
Cisco Firepower Threat Defense
513
VMScore
CVE-2018-0296
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software ...
Cisco Adaptive Security Appliance Software 8.1\\(2.5\\)
Cisco Adaptive Security Appliance Software
Cisco Firepower Threat Defense 6.2.3
Cisco Firepower Threat Defense
Cisco Firepower Threat Defense 6.2.3.1
Cisco Firepower Threat Defense 6.2.3-851
Cisco Firepower Threat Defense 6.2.3-85.02
2 EDB exploits
11 Github repositories
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »