|ID||CVSS||Summary||Last (major) update||Published|
RSA NetWitness Platform versions prior to 126.96.36.199 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote
|25-08-2018 - 06:29||24-08-2018 - 11:29|
EMC RSA NetWitness before 188.8.131.52 and RSA Security Analytics before 10.2.4 and 10.3.x before 10.3.2, when Kerberos PAM is enabled, do not require a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid a
|16-05-2014 - 10:25||16-05-2014 - 07:11|
EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from
|07-01-2014 - 23:42||09-12-2013 - 13:55|
The web interface in EMC RSA NetWitness Informer before 184.108.40.206 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
|05-12-2012 - 11:07||05-12-2012 - 06:57|
Cross-site request forgery (CSRF) vulnerability in the web interface in EMC RSA NetWitness Informer before 220.127.116.11 allows remote attackers to hijack the authentication of arbitrary users.
|05-12-2012 - 10:55||05-12-2012 - 06:57|