Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
yordam vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2023-4676
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yordam MedasPro allows Reflected XSS.This issue affects MedasPro: prior to 28.
Yordam Medaspro
4.7
CVSSv3
CVE-2021-45476
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated reflected XSS vulnerability.
Yordam Library Automation System
6.5
CVSSv3
CVE-2021-45477
Improper Handling of Parameters vulnerability in Bordam Information Technologies Library Automation System allows Collect Data as Provided by Users.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
5.4
CVSSv3
CVE-2021-45479
Improper Neutralization of Input During Web Page Generation vulnerability in Yordam Information Technologies Library Automation System allows Stored XSS.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
5.3
CVSSv3
CVE-2021-45475
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated Information disclosure vulnerability.
Yordam Library Automation System
6.5
CVSSv3
CVE-2021-45478
Improper Handling of Parameters vulnerability in Bordam Information Technologies Library Automation System allows Collect Data as Provided by Users.This issue affects Library Automation System: prior to 19.2.
Yordam Library Automation System
6.1
CVSSv3
CVE-2022-2266
University Library Automation System developed by Yordam Bilgi Teknolojileri before version 19.2 has an unauthenticated Reflected XSS vulnerability. This has been fixed in the version 19.2
Yordam Library Automation System
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started