Filtered by vendor Ibm
Subscribe
Total
7776 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-1739 | 1 Ibm | 1 Lotus Domino | 2017-07-29 | 7.8 HIGH | N/A |
Heap-based buffer overflow in the LDAP server in IBM Lotus Domino before 6.5.6 and 7.x before 7.0.2 FP1 allows remote attackers to cause a denial of service (crash) via a long, malformed DN request, which causes only the lower 16 bits of the string length to be used in memory allocation. | |||||
CVE-2007-0670 | 1 Ibm | 1 Aix | 2017-07-29 | 4.6 MEDIUM | N/A |
Buffer overflow in bos.rte.libc in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via the "r-commands", possibly including (1) rdist, (2) rsh, (3) rcp, (4) rsync, and (5) rlogin. | |||||
CVE-2005-4866 | 1 Ibm | 1 Db2 Universal Database | 2017-07-29 | 6.8 MEDIUM | N/A |
Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote attackers to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which causes a null terminator to be removed and leads to the overflow. | |||||
CVE-2003-1361 | 2 Ibm, Veritas | 2 Tivoli Storage Manager, Bare Metal Restore | 2017-07-29 | 10.0 HIGH | N/A |
Unknown vulnerability in VERITAS Bare Metal Restore (BMR) of Tivoli Storage Manager (TSM) 3.1.0 through 3.2.1 allows remote attackers to gain root privileges on the BMR Main Server. | |||||
CVE-2005-4870 | 1 Ibm | 1 Db2 | 2017-07-29 | 4.3 MEDIUM | N/A |
Stack-based buffer overflows in the (1) xmlvarcharfromfile, (2) xmlclobfromfile, (3) xmlfilefromvarchar, and (4) xmlfilefromclob function calls in IBM DB2 8.1 allow remote attackers to execute arbitrary code via a 94-byte second argument, which causes the return address to be overwritten with a pointer to the argument. | |||||
CVE-2006-6607 | 1 Ibm | 1 Tivoli Identity Manager | 2017-07-29 | 2.7 LOW | N/A |
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing the process or using other methods. | |||||
CVE-2007-0067 | 1 Ibm | 1 Lotus Domino Web Server | 2017-07-29 | 7.8 HIGH | N/A |
Unspecified vulnerability in the Lotus Domino Web Server 6.0, 6.5.x before 6.5.6, and 7.0.x before 7.0.3 allows remote attackers to cause a denial of service (daemon crash) via requests for URLs that reference certain files. | |||||
CVE-2005-4865 | 1 Ibm | 1 Db2 Universal Database | 2017-07-29 | 10.0 HIGH | N/A |
Stack-based buffer overflow in call in IBM DB2 7.x and 8.1 allows remote attackers to execute arbitrary code via a long libname. | |||||
CVE-2005-4863 | 1 Ibm | 1 Db2 Universal Database | 2017-07-29 | 7.2 HIGH | N/A |
Stack-based buffer overflow in db2fmp in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long parameter. | |||||
CVE-2004-2697 | 1 Ibm | 1 Aix | 2017-07-29 | 6.9 MEDIUM | N/A |
The Inventory Scout daemon (invscoutd) 1.3.0.0 and 2.0.2 for AIX 4.3.3 and 5.1 allows local users to gain privileges via a symlink attack on a command line argument (log file). NOTE: this might be related to CVE-2006-5002. | |||||
CVE-2005-4864 | 1 Ibm | 1 Db2 Universal Database | 2017-07-29 | 7.2 HIGH | N/A |
Stack-based buffer overflow in libdb2.so in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long DB2LPORT environment variable. | |||||
CVE-2005-4869 | 1 Ibm | 1 Db2 | 2017-07-29 | 2.1 LOW | N/A |
The (1) to_char and (2) to_date function in IBM DB2 8.1 allows local users to cause a denial of service (application crash) via an empty string in the second parameter, which causes a null pointer dereference. | |||||
CVE-2007-0068 | 1 Ibm | 1 Lotus Domino | 2017-07-29 | 9.3 HIGH | N/A |
IBM Lotus Domino 7.0.x before 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database. | |||||
CVE-2006-6636 | 1 Ibm | 1 Websphere Application Server | 2017-07-29 | 10.0 HIGH | N/A |
Unspecified vulnerability in the Utility Classes for IBM WebSphere Application Server (WAS) before 5.1.1.13 and 6.x before 6.0.2.17 has unknown impact and attack vectors. | |||||
CVE-2005-4871 | 1 Ibm | 1 Db2 | 2017-07-29 | 4.3 MEDIUM | N/A |
Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile. | |||||
CVE-2003-1447 | 1 Ibm | 1 Websphere Application Server | 2017-07-29 | 1.9 LOW | N/A |
IBM WebSphere Advanced Server Edition 4.0.4 uses a weak encryption algorithm (XOR and base64 encoding), which allows local users to decrypt passwords when the configuration file is exported to XML. | |||||
CVE-2005-4867 | 1 Ibm | 1 Db2 Universal Database | 2017-07-29 | 9.3 HIGH | N/A |
Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote attackers to execute arbitrary code via a long parameter. | |||||
CVE-2005-4819 | 1 Ibm | 1 Lotus Domino | 2017-07-29 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Lotus Domino versions before 6.5.4 fix pack 1 (FP1) and versions before 7.0 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. | |||||
CVE-2017-1318 | 1 Ibm | 1 Mq Appliance | 2017-07-28 | 9.0 HIGH | 8.8 HIGH |
IBM MQ Appliance 8.0 and 9.0 could allow an authenticated messaging administrator to execute arbitrary commands on the system, caused by command execution. IBM X-Force ID: 125730. | |||||
CVE-2017-1287 | 1 Ibm | 1 Rhapsody Design Manager | 2017-07-28 | 4.9 MEDIUM | 5.4 MEDIUM |
IBM Rhapsody DM 5.0 and 6.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. |