Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Total 7378 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4589 1 Ibm 1 Websphere Application Server 2024-11-21 10.0 HIGH 9.8 CRITICAL
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 184585.
CVE-2020-4588 2 Ibm, Microsoft 2 I2 Ibase, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
IBM i2 iBase 8.9.13 could allow an attacker to upload arbitrary executable files which, when executed by an unsuspecting victim could result in code execution. IBM X-Force ID: 184579.
CVE-2020-4587 1 Ibm 2 Connect\, Sterling Connect\ 2024-11-21 7.2 HIGH 7.8 HIGH
IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.
CVE-2020-4584 1 Ibm 1 I2 Ibase 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574.
CVE-2020-4581 1 Ibm 1 Datapower Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a chunked transfer-encoding HTTP/2 request. IBM X-Force ID: 184441.
CVE-2020-4580 1 Ibm 1 Datapower Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted a JSON request with invalid characters. IBM X-Force ID: 184439.
CVE-2020-4579 1 Ibm 1 Datapower Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted HTTP/2 request with invalid characters. IBM X-Force ID: 184438.
CVE-2020-4578 5 Hp, Ibm, Linux and 2 more 8 Hp-ux, Aix, I and 5 more 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 184433.
CVE-2020-4576 1 Ibm 1 Websphere Application Server 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM WebSphere Application Server 7.5, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to obtain sensitive information with a specially-crafted sequence of serialized objects. IBM X-Force ID: 184428.
CVE-2020-4575 1 Ibm 2 Websphere Application Server, Websphere Virtual Enterprise 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
IBM WebSphere Application Server ND 8.5 and 9.0, and IBM WebSphere Virtual Enterprise 7.0 and 8.0 are vulnerable to cross-site scripting when High Availability Deployment Manager is configured.
CVE-2020-4574 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Tivoli Key Lifecycle Manager does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 184181.
CVE-2020-4573 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 could disclose sensitive information due to responding to unauthenticated HTTP requests. IBM X-Force ID: 184180.
CVE-2020-4572 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184179.
CVE-2020-4569 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. IBM X-Force ID: 184158.
CVE-2020-4568 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 2.1 LOW 5.5 MEDIUM
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.
CVE-2020-4567 1 Ibm 1 Security Key Lifecycle Manager 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 184156.
CVE-2020-4566 1 Ibm 1 Sterling B2b Integrator 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 stores potentially highly sensitive information in log files that could be read by an authenticated user. IBM X-Force ID: 184083.
CVE-2020-4565 1 Ibm 1 Spectrum Protect Plus 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
IBM Spectrum Protect Plus 10.1.0 through 10.1.5 could allow an attacker to obtain sensitive information due to insecure communications being used between the application and server. IBM X-Force ID: 183935.
CVE-2020-4564 1 Ibm 2 Sterling B2b Integrator, Sterling File Gateway 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933.
CVE-2020-4562 1 Ibm 1 Planning Analytics 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information by allowing cross-window communication with unrestricted target origin via documentation frames.