Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-08 | CVE-2016-5902 | Cross-site Scripting vulnerability in IBM products IBM Maximo Asset Management is vulnerable to cross-site scripting. | 6.1 |
2017-02-08 | CVE-2016-5900 | Information Exposure vulnerability in IBM Tealeaf Customer Experience on Cloud Network Capture Add-On 16.1.01 IBM Tealeaf Customer Experience on Cloud Network Capture Add-On could allow a remote attacker to obtain sensitive information, caused by the failure to properly validate the TLS certificate. | 5.9 |
2017-02-08 | CVE-2016-0310 | Cross-site Scripting vulnerability in IBM Connections IBM Connections 5.5 and earlier is vulnerable to possible host header injection attack that could cause navigation to the attacker's domain. | 5.4 |
2017-02-08 | CVE-2016-0308 | Improper Access Control vulnerability in IBM Connections IBM Connections 5.5 and earlier is vulnerable to possible link manipulation attack that could result in the display of inappropriate background images. | 4.3 |
2017-02-08 | CVE-2016-0307 | Information Exposure vulnerability in IBM Connections IBM Connections 5.5 and earlier allows remote attackers to obtain sensitive information by reading stack traces in returned responses. | 4.3 |
2017-02-08 | CVE-2016-0305 | Cross-site Scripting vulnerability in IBM Connections IBM Connections is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. | 5.4 |
2017-02-08 | CVE-2016-0210 | Information Exposure vulnerability in IBM Sterling B2B Integrator 5.1/5.2 IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to obtain sensitive information. | 5.3 |
2017-02-08 | CVE-2016-0203 | Information Exposure vulnerability in IBM Cloud Orchestrator and Smartcloud Orchestrator A vulnerability has been identified in the IBM Cloud Orchestrator task API. | 5.5 |
2017-02-08 | CVE-2015-7493 | Information Exposure vulnerability in IBM Infosphere Information Server IBM InfoSphere Information Server could allow a local user under special circumstances to execute commands during installation processes that could expose sensitive information. | 4.7 |
2017-02-08 | CVE-2015-7418 | Information Exposure vulnerability in IBM Websphere Extreme Scale IBM WebSphere eXtreme Scale and the WebSphere DataPower XC10 Appliance allow some sensitive data to linger in memory instead of being overwritten which could allow a local user with administrator privileges to obtain sensitive information. | 4.4 |