CVE-2019-3486
- EPSS 0.3%
- Published 25.07.2019 15:15:11
- Last modified 21.11.2024 04:42:07
Mitigates a stored cross site scripting issue in ArcSight Security Management Center versions prior to 2.9.1
CVE-2018-6505
- EPSS 0.93%
- Published 20.09.2018 19:29:01
- Last modified 21.11.2024 04:10:47
A potential Unauthenticated File Download vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Unauthenticated File Downloads.
CVE-2018-6502
- EPSS 0.29%
- Published 20.09.2018 19:29:00
- Last modified 21.11.2024 04:10:47
A potential Reflected Cross-Site Scripting (XSS) Security vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Reflected Cross-site Scripting (XSS).
CVE-2018-6503
- EPSS 0.28%
- Published 20.09.2018 19:29:00
- Last modified 21.11.2024 04:10:47
A potential Access Control vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for vulnerable Access Controls.
CVE-2018-6500
- EPSS 1.5%
- Published 20.09.2018 16:29:00
- Last modified 21.11.2024 04:10:47
A potential Directory Traversal Security vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be remotely exploited to allow Directory Traversal.
CVE-2018-6501
- EPSS 0.26%
- Published 20.09.2018 16:29:00
- Last modified 21.11.2024 04:10:47
Potential security vulnerability of Insufficient Access Controls has been identified in ArcSight Management Center (ArcMC) for versions prior to 2.81. This vulnerability could be exploited to allow for insufficient access controls.
CVE-2015-6030
- EPSS 0.98%
- Published 04.11.2015 03:59:08
- Last modified 12.04.2025 10:46:40
HP ArcSight Logger 6.0.0.7307.1, ArcSight Command Center 6.8.0.1896.0, and ArcSight Connector Appliance 6.4.0.6881.3 use the root account to execute files owned by the arcsight user, which might allow local users to gain privileges by leveraging arcs...