Vulnerabilities > IBM > Tivoli Storage Manager > 6.4.1.7
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-01 | CVE-2016-6110 | Credentials Management vulnerability in IBM products IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user. | 2.1 |
2017-02-01 | CVE-2016-0371 | Unspecified vulnerability in IBM Tivoli Storage Manager The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled. | 5.5 |
2017-02-01 | CVE-2016-5985 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM Tivoli Storage Manager The IBM Tivoli Storage Manager (IBM Spectrum Protect) AIX client is vulnerable to a buffer overflow when Journal-Based Backup is enabled. | 7.2 |
2016-07-03 | CVE-2016-2894 | Information Exposure vulnerability in IBM Tivoli Storage Manager IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions. | 2.1 |
2015-02-13 | CVE-2014-6185 | Permissions, Privileges, and Access Controls vulnerability in IBM Tivoli Storage Manager dsmtca in the client in IBM Tivoli Storage Manager (TSM) 6.3 before 6.3.2.3, 6.4 before 6.4.2.2, and 7.1 before 7.1.1.3 does not properly restrict shared-library loading, which allows local users to gain privileges via a crafted DSO file. | 7.2 |
2014-08-26 | CVE-2013-6335 | Improper Preservation of Permissions vulnerability in IBM Tivoli Storage Manager The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and restore operations, which allows local users to bypass intended access restrictions via standard filesystem operations. | 3.3 |