Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wolfgang ettlinger vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-8465
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an malicious user to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.
Trendmicro Interscan Web Security Virtual Appliance 6.5
9.8
CVSSv3
CVE-2020-8466
A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated malicious user to execute certain commands by providing a manipulated password.
Trendmicro Interscan Web Security Virtual Appliance 6.5
9.8
CVSSv3
CVE-2017-9283
An out-of-bounds read (CWE-125) vulnerability exists in Micro Focus VisiBroker 8.5. The feasibility of leveraging this vulnerability for further attacks was not assessed.
Microfocus Visibroker 8.5
9.8
CVSSv3
CVE-2017-9282
An integer overflow (CWE-190) led to an out-of-bounds write (CWE-787) on a heap-allocated area, leading to heap corruption in Micro Focus VisiBroker 8.5. The feasibility of leveraging this vulnerability for further attacks was not assessed.
Microfocus Visibroker 8.5
9.8
CVSSv3
CVE-2016-5762
Integer overflow in the Post Office Agent in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 might allow remote malicious users to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
Novell Groupwise
Novell Groupwise 2014
9.1
CVSSv3
CVE-2018-7702
SecurEnvoy SecurMail prior to 9.2.501 allows remote malicious users to spoof transmission of arbitrary e-mail messages, resend e-mail messages to arbitrary recipients, or modify arbitrary message bodies and attachments by leveraging missing authentication and authorization.
Securenvoy Securmail
1 EDB exploit
8.8
CVSSv3
CVE-2020-8461
A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an malicious user to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.
Trendmicro Interscan Web Security Virtual Appliance 6.5
8.8
CVSSv3
CVE-2020-27694
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 has updated a specific critical library that may vulnerable to attack.
Trendmicro Interscan Messaging Security Virtual Appliance
8.8
CVSSv3
CVE-2020-27016
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an malicious user to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled we...
Trendmicro Interscan Messaging Security Virtual Appliance
8.8
CVSSv3
CVE-2016-1608
vaconfig/time in Novell Filr prior to 1.2 Security Update 3 and 2.0 before Security Update 2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the ntpServer parameter.
Novell Filr
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »