Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
yordam vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-4676
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yordam MedasPro allows Reflected XSS.This issue affects MedasPro: prior to 28.
Yordam Medaspro
NA
CVE-2021-45476
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated reflected XSS vulnerability.
Yordam Library Automation System
NA
CVE-2021-45477
Improper Handling of Parameters vulnerability in Bordam Information Technologies Library Automation System allows Collect Data as Provided by Users.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
NA
CVE-2021-45479
Improper Neutralization of Input During Web Page Generation vulnerability in Yordam Information Technologies Library Automation System allows Stored XSS.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
NA
CVE-2021-45475
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated Information disclosure vulnerability.
Yordam Library Automation System
NA
CVE-2021-45478
Improper Handling of Parameters vulnerability in Bordam Information Technologies Library Automation System allows Collect Data as Provided by Users.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
NA
CVE-2022-2266
University Library Automation System developed by Yordam Bilgi Teknolojileri before version 19.2 has an unauthenticated Reflected XSS vulnerability. This has been fixed in the version 19.2
Yordam Library Automation System
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started