Vulnerabilities > IBM > Security Appscan > 8.6

DATE CVE VULNERABILITY TITLE RISK
2014-12-23 CVE-2014-6135 Improper Input Validation vulnerability in IBM Security Appscan and Security Appscan Source
IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
network
ibm CWE-20
4.3
2014-12-23 CVE-2014-6122 Permissions, Privileges, and Access Controls vulnerability in IBM Security Appscan and Security Appscan Source
IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote authenticated users to write to arbitrary folders, and consequently execute arbitrary commands, via a modified argument.
network
low complexity
ibm CWE-264
5.5
2014-12-23 CVE-2014-6121 Cross-Site Scripting vulnerability in IBM Security Appscan and Security Appscan Source
Cross-site scripting (XSS) vulnerability in IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
network
ibm CWE-79
3.5
2014-12-23 CVE-2014-6119 Code Injection vulnerability in IBM Security Appscan and Security Appscan Source
IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote attackers to execute arbitrary code via a crafted executable file in an archive.
network
ibm CWE-94
critical
9.3
2014-03-26 CVE-2014-0904 Improper Input Validation vulnerability in IBM Security Appscan
The update process in IBM Security AppScan Standard 7.9 through 8.8 does not require integrity checks of downloaded files, which allows remote attackers to execute arbitrary code via a crafted file.
network
high complexity
ibm CWE-20
7.6