Show filters
164 Total Results
Displaying 71-80 of 164
Sort by:
Attacker Value
Unknown
CVE-2019-4705
Disclosure Date: June 30, 2020 (last updated November 28, 2024)
IBM Security Identity Manager Virtual Appliance 7.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 172015.
0
Attacker Value
Unknown
CVE-2019-4676
Disclosure Date: June 30, 2020 (last updated February 21, 2025)
IBM Security Identity Manager Virtual Appliance 7.0.2 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171512.
0
Attacker Value
Unknown
CVE-2020-5345
Disclosure Date: June 18, 2020 (last updated February 21, 2025)
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an authorization bypass vulnerability. An authenticated malicious user may potentially execute commands to alter or stop database statistics.
0
Attacker Value
Unknown
CVE-2020-5367
Disclosure Date: June 18, 2020 (last updated February 21, 2025)
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an improper certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim's data in transit.
0
Attacker Value
Unknown
CVE-2020-8603
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
0
Attacker Value
Unknown
CVE-2020-8606
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
0
Attacker Value
Unknown
CVE-2020-8604
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
0
Attacker Value
Unknown
CVE-2020-8605
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2019-15268
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
0
Attacker Value
Unknown
CVE-2019-15269
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
0