Ibm

Emptoris Sourcing

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.27%
  • Veröffentlicht 12.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

IBM Emptoris Sourcing 9.5.x through 10.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure ...

  • EPSS 0.21%
  • Veröffentlicht 12.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

IBM Emptoris Sourcing 9.5.x through 10.1.x could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to s...

  • EPSS 0.27%
  • Veröffentlicht 12.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

IBM Emptoris Sourcing 9.5.x through 10.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure ...

  • EPSS 0.24%
  • Veröffentlicht 12.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

IBM Emptoris Sourcing 9.5.x through 10.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure ...

  • EPSS 0.12%
  • Veröffentlicht 12.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

IBM Emptoris Sourcing 9.5.x through 10.1.x could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to s...

  • EPSS 0.16%
  • Veröffentlicht 06.10.2015 01:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

IBM Emptoris Sourcing 10.0.2.0 before iFix6, 10.0.2.2 before iFix11, 10.0.2.3, 10.0.2.5 before iFix4, 10.0.2.6 before iFix8, 10.0.2.7 before iFix1, and 10.0.4.x before iFix2 allows remote authenticated users to obtain sensitive supplier-bid informati...