Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-01 | CVE-2016-3024 | Information Exposure vulnerability in IBM products IBM Security Access Manager for Web allows web pages to be stored locally which can be read by another user on the system. | 4.0 |
2017-02-01 | CVE-2016-3023 | Information Exposure vulnerability in IBM products IBM Security Access Manager for Web could allow an unauthenticated user to gain access to sensitive information by entering invalid file names. | 5.3 |
2017-02-01 | CVE-2016-3022 | Permission Issues vulnerability in IBM products IBM Security Access Manager for Web could allow an authenticated user to gain access to highly sensitive information due to incorrect file permissions. | 6.5 |
2017-02-01 | CVE-2016-3018 | Cross-site Scripting vulnerability in IBM products IBM Security Access Manager for Web is vulnerable to cross-site scripting. | 6.1 |
2017-02-01 | CVE-2016-3016 | Insufficient Verification of Data Authenticity vulnerability in IBM products IBM Security Access Manager for Web processes patches, image backups and other updates without sufficiently verifying the origin and integrity of the code, which could allow an authenticated attacker to load malicious code. | 4.4 |
2017-02-01 | CVE-2016-2987 | Information Exposure vulnerability in IBM products An undisclosed vulnerability in CLM applications may result in some administrative deployment parameters being shown to an attacker. | 4.3 |
2017-02-01 | CVE-2016-2939 | Cross-site Scripting vulnerability in IBM Domino and Inotes IBM iNotes is vulnerable to cross-site scripting. | 6.1 |
2017-02-01 | CVE-2016-2938 | Cross-site Scripting vulnerability in IBM Domino and Inotes IBM iNotes is vulnerable to cross-site scripting. | 6.1 |
2017-02-01 | CVE-2016-0265 | Cross-site Scripting vulnerability in IBM Campaign IBM Campaign is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. | 5.4 |
2017-02-01 | CVE-2016-9963 | Key Management Errors vulnerability in multiple products Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages. | 5.9 |