Filtered by vendor Ibm
Subscriptions
Total
7683 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-51453 | 1 Ibm | 1 Sterling Secure Proxy | 2025-06-09 | 4.3 Medium |
IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. | ||||
CVE-2024-38341 | 1 Ibm | 1 Sterling Secure Proxy | 2025-06-09 | 5.9 Medium |
IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | ||||
CVE-2025-3357 | 1 Ibm | 1 Tivoli Monitoring | 2025-06-09 | 9.8 Critical |
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array. | ||||
CVE-2024-45094 | 1 Ibm | 7 Ds8900f Firmware, Hardware Management Console R10.0, Hardware Management Console R10.0 Firmware and 4 more | 2025-06-09 | 5.5 Medium |
IBM DS8900F and DS8A00 Hardware Management Console (HMC) is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | ||||
CVE-2025-33079 | 1 Ibm | 2 Cognos Controller, Controller | 2025-06-09 | 6.5 Medium |
IBM Controller 11.0.0, 11.0.1, and 11.1.0 application could allow an authenticated user to obtain sensitive credentials that may be inadvertently included within the source code. | ||||
CVE-2025-1499 | 1 Ibm | 2 Infosphere Information Server, Infosphere Information Server On Cloud | 2025-06-09 | 6.5 Medium |
IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user. | ||||
CVE-2025-25044 | 1 Ibm | 1 Planning Analytics Local | 2025-06-09 | 5.4 Medium |
IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | ||||
CVE-2025-2896 | 1 Ibm | 1 Planning Analytics Local | 2025-06-09 | 4.8 Medium |
IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | ||||
CVE-2025-33004 | 1 Ibm | 1 Planning Analytics Local | 2025-06-09 | 6.5 Medium |
IBM Planning Analytics Local 2.0 and 2.1 could allow a privileged user to delete files from directories due to improper pathname restriction. | ||||
CVE-2025-33005 | 1 Ibm | 1 Planning Analytics Local | 2025-06-09 | 6.3 Medium |
IBM Planning Analytics Local 2.0 and 2.1 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system. | ||||
CVE-2024-56343 | 1 Ibm | 1 Security Verify Access | 2025-06-09 | 4.3 Medium |
IBM Verify Identity Access Digital Credentials 24.06 could allow an authenticated user to crash the service with a specially crafted POST request. | ||||
CVE-2024-56342 | 1 Ibm | 1 Security Verify Access | 2025-06-06 | 4.3 Medium |
IBM Verify Identity Access Digital Credentials 24.06 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. | ||||
CVE-2024-22330 | 1 Ibm | 1 Security Verify Governance | 2025-06-06 | 5.9 Medium |
IBM Security Verify Governance 10.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. | ||||
CVE-2025-1329 | 2 Ibm, Linux | 2 Cics Tx, Linux Kernel | 2025-06-05 | 7.8 High |
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyaddr function. | ||||
CVE-2025-1330 | 2 Ibm, Linux | 2 Cics Tx, Linux Kernel | 2025-06-05 | 7.8 High |
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname function. | ||||
CVE-2025-1331 | 2 Ibm, Linux | 2 Cics Tx, Linux Kernel | 2025-06-05 | 7.8 High |
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to the use of unsafe use of the gets function. | ||||
CVE-2025-33103 | 1 Ibm | 1 I | 2025-06-04 | 8.5 High |
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 product IBM TCP/IP Connectivity Utilities for i contains a privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. | ||||
CVE-2025-1138 | 1 Ibm | 2 Infosphere Information Server, Infosphere Information Server On Cloud | 2025-06-04 | 4.3 Medium |
IBM InfoSphere Information Server 11.7 could disclose sensitive information to an authenticated user that could aid in further attacks against the system through a directory listing. | ||||
CVE-2024-51475 | 1 Ibm | 1 Content Navigator | 2025-06-04 | 5.4 Medium |
IBM Content Navigator 3.0.11, 3.0.15, and 3.1.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. | ||||
CVE-2024-45655 | 1 Ibm | 1 Application Gateway | 2025-06-04 | 5.5 Medium |
IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment. |