Known Vulnerabilities for products from Verint

Listed below are 11 of the newest known vulnerabilities associated with the vendor "Verint".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-41825 Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML injection via the /wfo/control/signin username parameter. 5.3 - MEDIUM 2021-10-08 2021-10-15
CVE-2020-24057 The management website of the Verint S5120FD Verint_FW_0_42 unit features a CGI endpoint ('ipfilter.cgi') that allows the use... 8.8 - HIGH 2020-08-21 2020-08-27
CVE-2020-24056 A hardcoded credentials vulnerability exists in Verint 5620PTZ Verint_FW_0_42, Verint 4320 V4320_FW_0_23, V4320_FW_0_31, and ... 7.5 - HIGH 2020-08-21 2021-07-21
CVE-2020-24055 Verint 5620PTZ Verint_FW_0_42 and Verint 4320 V4320_FW_0_23, and V4320_FW_0_31 units feature an autodiscovery service impleme... 9.8 - CRITICAL 2020-08-21 2020-08-27
CVE-2020-23446 Verint Workforce Optimization suite 15.1 (15.1.0.37634) has Unauthenticated Information Disclosure via API 5.3 - MEDIUM 2020-09-22 2021-07-21
CVE-2020-13480 Verint Workforce Optimization (WFO) 15.2 allows HTML injection via the "send email" feature. 5.4 - MEDIUM 2020-06-22 2021-07-21
CVE-2019-12784 An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the login form can accept submissions from external... 8.8 - HIGH 2020-07-14 2020-07-16
CVE-2019-12783 An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the rd parameter can accept a URL, to which users w... 6.1 - MEDIUM 2020-07-14 2020-07-16
CVE-2019-12773 An issue was discovered in Verint Impact 360 15.1. At wfo/help/help_popup.jsp, the helpURL parameter can be changed to embed ... 6.1 - MEDIUM 2020-07-14 2020-07-16
CVE-2018-17872 Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Insecure Permissions. 8.8 - HIGH 2018-10-04 2020-08-24
CVE-2018-17871 Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Incorrect Access Control. 6.5 - MEDIUM 2018-10-04 2020-09-29

Known software with vulnerabilities from Verint

Type Vendor Product Version
ApplicationVerintImpact 36015.1
HardwareVerintS5120fd-
Operating
System
VerintS5120fd Firmwareverint_fw_0_42
ApplicationVerintVerba Collaboration Compliance And Quality Management Platform7.0
ApplicationVerintWorkforce Optimization15.1.0.37634

Popular searches for "Verint"

Verint WorkView

apps.apple.com/us/app/verint-workview/id1159868631 Search in App Store

App Store Verint WorkView Business 246 N" 1159868631 : Verint WorkView

Verint Systems

Verint Systems is a Melville, New York-based analytics company which was founded in 2002. The company sells software and hardware products for customer engagement management, security, surveillance, and business intelligence. Their products are designed to assist clients in data analysis, specifically large data sets. Verint has more than 10,000 clients in 150 countries, and has approximately 2,800 employees in various locations internationally.

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report