Vulnerabilities > IBM
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-11 | CVE-2017-1632 | Cross-site Scripting vulnerability in IBM Sterling File Gateway 2.2 IBM Sterling File Gateway 2.2 is vulnerable to cross-site scripting. | 5.4 |
2017-12-11 | CVE-2017-1613 | Information Exposure vulnerability in IBM Connections 6.0 IBM Connections 6.0 could allow an unauthenticated remote attacker to gain unauthenticated or unauthorized access to non-sensitive Engagement Center template data. | 5.3 |
2017-12-11 | CVE-2017-1606 | SQL Injection vulnerability in IBM Financial Transaction Manager IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) 3.0.0.0 through 3.0.0.7 is vulnerable to SQL injection. | 8.8 |
2017-12-11 | CVE-2017-1550 | Unspecified vulnerability in IBM Sterling File Gateway 2.2 IBM Sterling File Gateway 2.2 could allow an authenticated user to change other user's passwords. | 6.5 |
2017-12-11 | CVE-2017-1549 | Cross-site Scripting vulnerability in IBM Sterling File Gateway 2.2 IBM Sterling File Gateway 2.2 is vulnerable to cross-site scripting. | 5.4 |
2017-12-11 | CVE-2017-1548 | Path Traversal vulnerability in IBM Sterling File Gateway 2.2 IBM Sterling File Gateway 2.2 could allow a remote attacker to traverse directories on the system. | 5.3 |
2017-12-11 | CVE-2017-1536 | Cross-site Scripting vulnerability in IBM Websphere Portal IBM Support Tools for Lotus WCM (IBM WebSphere Portal 7.0, 8.0, 8.5 and 9.0) is vulnerable to cross-site scripting. | 5.4 |
2017-12-11 | CVE-2017-1507 | Information Exposure vulnerability in IBM products IBM Jazz Foundation Products could disclose sensitive information during a scan that could lead to further attacks against the system. | 4.3 |
2017-12-07 | CVE-2017-1498 | Cross-site Scripting vulnerability in IBM Connections 5.5.0.0 IBM Connections 5.5 is vulnerable to cross-site scripting. | 5.4 |
2017-12-07 | CVE-2017-1497 | Information Exposure vulnerability in IBM Sterling File Gateway 2.2 IBM Sterling File Gateway 2.2 could allow an unauthorized user to view files they should not have access to providing they know the directory location of the file. | 3.7 |