Vulnerabilities > IBM > Tivoli Monitoring > 6.2.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-09-19 | CVE-2017-1794 | Resource Exhaustion vulnerability in IBM Tivoli Monitoring IBM Tivoli Monitoring 6.2.3 through 6.2.3.5 and 6.3.0 through 6.3.0.7 are vulnerable to both TEPS user privilege escalation and possible denial of service due to unconstrained memory growth. | 7.5 |
2018-03-22 | CVE-2017-1789 | Code Injection vulnerability in IBM Tivoli Monitoring IBM Tivoli Monitoring V6 6.2.3 and 6.3.0 could allow an unauthenticated user to remotely execute code through unspecified methods. | 9.8 |
2017-06-27 | CVE-2016-6083 | Information Exposure vulnerability in IBM Tivoli Monitoring IBM Tivoli Monitoring V6 could allow an unauthenticated user to access SOAP queries that could contain sensitive information. | 5.3 |
2017-03-08 | CVE-2016-5933 | 7PK - Security Features vulnerability in IBM Tivoli Monitoring IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. | 4.6 |
2016-12-01 | CVE-2016-2946 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM Tivoli Monitoring Stack-based buffer overflow in the ax Shared Libraries in the Agent in IBM Tivoli Monitoring (ITM) 6.2.2 before FP9, 6.2.3 before FP5, and 6.3.0 before FP2 on Linux and UNIX allows local users to gain privileges via unspecified vectors. | 7.8 |
2016-03-12 | CVE-2015-7411 | Permissions, Privileges, and Access Controls vulnerability in IBM Tivoli Monitoring The portal client in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 through FP6 allows remote authenticated users to gain privileges via unspecified vectors. | 9.9 |
2016-01-03 | CVE-2015-5003 | Command Injection vulnerability in IBM Tivoli Monitoring 6.2.2/6.2.3/6.3.0 The portal in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7 allows remote authenticated users to execute arbitrary commands by leveraging Take Action view authority and providing crafted input. | 8.5 |