Vulnerabilities > IBM > Medium

DATE CVE VULNERABILITY TITLE RISK
2024-06-28 CVE-2024-35139 Unspecified vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from the container due to incorrect default permissions.
local
low complexity
ibm
5.5
2024-06-27 CVE-2023-38368 Unspecified vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could disclose sensitive information to a local user to do improper permission controls.
local
low complexity
ibm
5.5
2024-06-27 CVE-2023-38370 Unspecified vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1, under certain configurations, could allow a user on the network to install malicious packages.
network
low complexity
ibm
6.5
2024-06-27 CVE-2023-42011 Unspecified vulnerability in IBM Sterling B2B Integrator 6.1/6.2
IBM Sterling B2B Integrator Standard Edition 6.1 and 6.2 does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
network
low complexity
ibm
5.4
2024-06-27 CVE-2023-42014 Unspecified vulnerability in IBM Sterling B2B Integrator
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.2.0.2 is vulnerable to cross-site scripting.
network
low complexity
ibm
5.4
2024-06-27 CVE-2024-35153 Unspecified vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting.
network
low complexity
ibm
4.8
2024-06-27 CVE-2023-30430 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from trace logs.
local
low complexity
ibm
5.5
2024-06-27 CVE-2024-31883 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption.
network
high complexity
ibm
5.9
2024-06-13 CVE-2024-25052 Insufficiently Protected Credentials vulnerability in IBM Jazz Reporting Service 7.0.3
IBM Jazz Reporting Service 7.0.3 stores user credentials in plain clear text which can be read by an admin user.
local
low complexity
ibm CWE-522
4.4
2024-06-12 CVE-2023-29267 Unspecified vulnerability in IBM DB2 10.5/11.1/11.5
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user.
network
low complexity
ibm
6.5