Vulnerabilities > IBM > Tivoli Directory Server > 6.0

DATE CVE VULNERABILITY TITLE RISK
2018-04-03 CVE-2015-1975 Injection vulnerability in IBM Tivoli Directory Server
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection.
local
low complexity
ibm CWE-74
4.6
2017-02-08 CVE-2015-1976 Improper Access Control vulnerability in IBM Security Directory Server and Tivoli Directory Server
IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash.
local
low complexity
ibm CWE-284
2.1
2015-06-28 CVE-2015-2019 Code vulnerability in IBM Tivoli Directory Server
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation.
local
low complexity
ibm CWE-17
2.1
2015-06-28 CVE-2015-1978 Cross-site Scripting vulnerability in IBM Tivoli Directory Server
Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
network
ibm CWE-79
4.3
2015-06-28 CVE-2015-1974 Permissions, Privileges, and Access Controls vulnerability in IBM Tivoli Directory Server
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors.
network
low complexity
ibm CWE-264
6.5
2015-06-28 CVE-2015-1972 Information Exposure vulnerability in IBM Tivoli Directory Server
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request.
network
ibm CWE-200
4.3
2015-06-28 CVE-2015-1959 Improper Access Control vulnerability in IBM Tivoli Directory Server
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action.
local
low complexity
ibm CWE-284
4.6
2015-03-25 CVE-2015-0138 Cryptographic Issues vulnerability in IBM Tivoli Directory Server
GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
network
ibm CWE-310
4.3
2012-04-22 CVE-2012-0743 Resource Management Errors vulnerability in IBM Tivoli Directory Server
IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request.
network
low complexity
ibm CWE-399
5.0
2012-04-22 CVE-2012-0726 Cryptographic Issues vulnerability in IBM Tivoli Directory Server
The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol.
network
low complexity
ibm CWE-310
6.4