Vulnerabilities > IBM > Medium

DATE CVE VULNERABILITY TITLE RISK
2014-09-10 CVE-2014-4786 Permissions, Privileges, and Access Controls vulnerability in IBM Initiate Master Data Service
IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 does not properly restrict use of FRAME elements, which allows remote authenticated users to conduct phishing attacks, and bypass intended access restrictions or obtain sensitive information, via a crafted web site, related to a "frame injection" issue.
network
ibm CWE-264
4.9
2014-09-10 CVE-2014-4785 Cross-Site Request Forgery (CSRF) vulnerability in IBM Initiate Master Data Service
Cross-site request forgery (CSRF) vulnerability in IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
network
ibm CWE-352
6.0
2014-09-10 CVE-2014-4784 Permissions, Privileges, and Access Controls vulnerability in IBM Initiate Master Data Service
IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 does not properly restrict use of FRAME elements, which allows remote attackers to conduct phishing attacks, and bypass intended access restrictions or obtain sensitive information, via a crafted web site, related to a "frame injection" issue.
network
ibm CWE-264
4.3
2014-09-10 CVE-2014-4783 Cross-Site Request Forgery (CSRF) vulnerability in IBM Initiate Master Data Service
Cross-site request forgery (CSRF) vulnerability in IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
network
ibm CWE-352
6.8
2014-09-10 CVE-2014-3037 Cross-Site Request Forgery (CSRF) vulnerability in IBM products
Cross-site request forgery (CSRF) vulnerability in IBM Configuration Management Application (aka VVC) in IBM Rational Engineering Lifecycle Manager before 4.0.7 and 5.x before 5.0.1, Rational Software Architect Design Manager before 4.0.7 and 5.x before 5.0.1, and Rational Rhapsody Design Manager before 4.0.7 and 5.x before 5.0.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
network
ibm CWE-352
6.0
2014-09-10 CVE-2014-0909 Information Exposure vulnerability in IBM Rational License KEY Server 8.1.4/8.1.4.2/8.1.4.3
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
network
low complexity
ibm CWE-200
5.0
2014-09-05 CVE-2014-0877 Permissions, Privileges, and Access Controls vulnerability in IBM Cognos TM1 10.2.0.2/10.2.2.0
IBM Cognos TM1 10.2.0.2 before IF1 and 10.2.2.0 before IF1 allows remote attackers to bypass intended access restrictions by visiting the Rights page and then following a generated link.
network
low complexity
ibm CWE-264
5.0
2014-09-05 CVE-2014-0863 Credentials Management vulnerability in IBM Cognos TM1
The client in IBM Cognos TM1 9.5.2.3 before IF5, 10.1.1.2 before IF1, 10.2.0.2 before IF1, and 10.2.2.0 before IF1 stores obfuscated passwords in memory, which allows remote authenticated users to obtain sensitive cleartext information via an unspecified security tool.
network
low complexity
ibm CWE-255
4.0
2014-09-04 CVE-2014-4759 Permissions, Privileges, and Access Controls vulnerability in IBM Business Process Manager 8.5.0.0/8.5.0.1/8.5.5.0
An unspecified Ajax service in the Content Management toolkit in IBM Business Process Manager (BPM) 8.5.x through 8.5.5 allows remote authenticated users to obtain sensitive information by performing a document-attachment search and then reading document properties in the search results.
network
low complexity
ibm CWE-264
4.0
2014-09-04 CVE-2014-4758 Permissions, Privileges, and Access Controls vulnerability in IBM products
IBM Business Process Manager (BPM) 7.5.x through 8.5.5 and WebSphere Lombardi Edition 7.2.x allow remote authenticated users to bypass intended access restrictions and send requests to internal services via a callService URL.
network
low complexity
ibm CWE-264
4.0