Vulnerabilities > IBM > Tivoli Monitoring > 6.2.3

DATE CVE VULNERABILITY TITLE RISK
2018-09-19 CVE-2017-1794 Resource Exhaustion vulnerability in IBM Tivoli Monitoring
IBM Tivoli Monitoring 6.2.3 through 6.2.3.5 and 6.3.0 through 6.3.0.7 are vulnerable to both TEPS user privilege escalation and possible denial of service due to unconstrained memory growth.
network
high complexity
ibm CWE-400
7.5
2018-03-22 CVE-2017-1789 Code Injection vulnerability in IBM Tivoli Monitoring
IBM Tivoli Monitoring V6 6.2.3 and 6.3.0 could allow an unauthenticated user to remotely execute code through unspecified methods.
network
low complexity
ibm CWE-94
critical
9.8
2017-06-27 CVE-2016-6083 Information Exposure vulnerability in IBM Tivoli Monitoring
IBM Tivoli Monitoring V6 could allow an unauthenticated user to access SOAP queries that could contain sensitive information.
network
low complexity
ibm CWE-200
5.3
2017-03-08 CVE-2016-5933 7PK - Security Features vulnerability in IBM Tivoli Monitoring
IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass.
network
low complexity
ibm CWE-254
4.6
2016-12-01 CVE-2016-2946 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM Tivoli Monitoring
Stack-based buffer overflow in the ax Shared Libraries in the Agent in IBM Tivoli Monitoring (ITM) 6.2.2 before FP9, 6.2.3 before FP5, and 6.3.0 before FP2 on Linux and UNIX allows local users to gain privileges via unspecified vectors.
local
low complexity
ibm CWE-119
7.8
2016-03-12 CVE-2015-7411 Permissions, Privileges, and Access Controls vulnerability in IBM Tivoli Monitoring
The portal client in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 through FP6 allows remote authenticated users to gain privileges via unspecified vectors.
network
low complexity
ibm CWE-264
critical
9.9
2016-01-03 CVE-2015-5003 Command Injection vulnerability in IBM Tivoli Monitoring 6.2.2/6.2.3/6.3.0
The portal in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7 allows remote authenticated users to execute arbitrary commands by leveraging Take Action view authority and providing crafted input.
network
high complexity
ibm CWE-77
8.5