cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2013-6805,https://securityvulnerability.io/vulnerability/CVE-2013-6805,,"OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes it easier for (1) remote attackers to discover credentials by sniffing the network or (2) local users to discover credentials by reading a .eod8 file.",Opentext,Exceed Ondemand,,,0.0016700000269338489,false,,false,false,false,,,false,false,,2014-05-19T14:00:00.000Z,0 CVE-2013-6807,https://securityvulnerability.io/vulnerability/CVE-2013-6807,,"The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by default, which allows man-in-the-middle attackers to bypass server certificate validation, redirect a connection, and obtain sensitive information via crafted responses.",Opentext,Exceed Ondemand,,,0.000750000006519258,false,,false,false,false,,,false,false,,2014-05-19T14:00:00.000Z,0 CVE-2013-6806,https://securityvulnerability.io/vulnerability/CVE-2013-6806,,"OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information via a crafted string in a response, which triggers a downgrade to simple authentication that sends credentials in plaintext.",Opentext,Exceed Ondemand,,,0.0015899999998509884,false,,false,false,false,,,false,false,,2014-05-19T14:00:00.000Z,0 CVE-2013-6994,https://securityvulnerability.io/vulnerability/CVE-2013-6994,,"OpenText Exceed OnDemand (EoD) 8 transmits the session ID in cleartext, which allows remote attackers to perform session fixation attacks by sniffing the network.",Opentext,Exceed Ondemand,,,0.0025400000158697367,false,,false,false,false,,,false,false,,2014-05-19T14:00:00.000Z,0