Filtered by vendor Ibm
Subscriptions
Total
7866 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2013-3003 | 1 Ibm | 1 Ims Enterprise Suite | 2025-04-11 | N/A |
Unspecified vulnerability in SOAP Gateway in IBM IMS Enterprise Suite 1.1, 2.1, and 2.2 allows remote authenticated users to execute arbitrary commands via unknown vectors. | ||||
CVE-2013-3006 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3008. | ||||
CVE-2013-3007 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 6.0.1 before 6.0.1 SR6 and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3006. | ||||
CVE-2013-3008 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3006. | ||||
CVE-2013-3010 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 6.0.1 before 6.0.1 SR6 and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3007. | ||||
CVE-2013-3011 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3012. | ||||
CVE-2013-3012 | 2 Ibm, Redhat | 2 Java, Rhel Extras | 2025-04-11 | N/A |
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3011. | ||||
CVE-2013-3016 | 1 Ibm | 1 Websphere Portal | 2025-04-11 | N/A |
IBM WebSphere Portal 6.1, 7.0, and 8.0 allows remote attackers to access the user directory via a crafted request for a servlet, related to the serveServletsByClassnameEnabled setting. | ||||
CVE-2013-3025 | 1 Ibm | 1 Rational Focal Point | 2025-04-11 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in IBM Rational Focal Point 6.5.x and 6.6.x before 6.6.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2013-3026 | 1 Ibm | 1 Lotus Quickr For Domino | 2025-04-11 | N/A |
Buffer overflow in the Lotus Quickr for Domino ActiveX control in qp2.cab in IBM Lotus Quickr 8.1 before FP 8.1.0.32-001a, 8.2 before FP 8.2.0.28-001a, and 8.5.1 before FP 8.5.1.39-002a for Domino allows remote attackers to execute arbitrary code via a crafted web site. | ||||
CVE-2013-3027 | 1 Ibm | 1 Lotus Domino | 2025-04-11 | N/A |
Integer overflow in the DWA9W ActiveX control in iNotes in IBM Domino 9.0 before IF3 allows remote attackers to execute arbitrary code via a crafted web page, aka SPR PTHN97XHFW. | ||||
CVE-2013-3028 | 1 Ibm | 1 Websphere Mq | 2025-04-11 | N/A |
Multiple buffer overflows in mqm programs in IBM WebSphere MQ 7.0.x before 7.0.1.11, 7.1.x before 7.1.0.3, and 7.5.x before 7.5.0.2 on non-Windows platforms allow local users to gain privileges via unspecified vectors. | ||||
CVE-2013-3030 | 1 Ibm | 1 Cognos Business Intelligence | 2025-04-11 | N/A |
The servlet gateway in IBM Cognos Business Intelligence 8.4.1 before IF3, 10.1.0 before IF4, 10.1.1 before IF4, 10.2.0 before IF4, 10.2.1 before IF2, and 10.2.1.1 before IF1 allows remote attackers to cause a denial of service (temporary gateway outage) via crafted HTTP requests. | ||||
CVE-2013-3033 | 1 Ibm | 1 Tivoli Remote Control | 2025-04-11 | N/A |
SQL injection vulnerability in the server component in IBM Tivoli Remote Control 5.1.2 before 5.1.2-TIV-TRC512-IF0015 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | ||||
CVE-2013-3035 | 1 Ibm | 2 Aix, Vios | 2025-04-11 | N/A |
The IPv6 implementation in the inet subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allows remote attackers to cause a denial of service (system hang) via a crafted packet to an IPv6 interface. | ||||
CVE-2013-3036 | 1 Ibm | 1 Rational Requirements Composer | 2025-04-11 | N/A |
Open redirect vulnerability in IBM Rational Requirements Composer before 4.0.4 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL. | ||||
CVE-2013-3037 | 1 Ibm | 1 Rational Requirements Composer | 2025-04-11 | N/A |
Unspecified vulnerability in IBM Rational Requirements Composer before 4.0.4 makes it easier for local users to gain privileges via unknown vectors. | ||||
CVE-2013-3038 | 1 Ibm | 1 Rational Requirements Composer | 2025-04-11 | N/A |
Unspecified vulnerability in IBM Rational Requirements Composer before 4.0.4 makes it easier for remote attackers to discover credentials via unknown vectors. | ||||
CVE-2013-3039 | 1 Ibm | 1 Rational Requirements Composer | 2025-04-11 | N/A |
IBM Rational Requirements Composer before 4.0.4 does not properly perform authentication, which has unspecified impact and remote attack vectors. | ||||
CVE-2013-3040 | 1 Ibm | 1 Infosphere Information Server | 2025-04-11 | N/A |
IBM InfoSphere Information Server through 8.5 FP3, 8.7 through FP2, and 9.1 produces login-failure messages indicating whether the username or password is incorrect, which allows remote attackers to enumerate user accounts via a brute-force attack. |