Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Total 7009 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-4858 1 Ibm 1 Cognos Business Intelligence 2017-08-29 9.3 HIGH N/A
IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 does not properly validate Java serialized input, which allows remote attackers to execute arbitrary commands via unspecified vectors.
CVE-2012-4857 1 Ibm 1 Informix Dynamic Server 2017-08-29 9.0 HIGH N/A
Buffer overflow in IBM Informix 11.50 through 11.50.xC9W2 and 11.70 before 11.70.xC7 allows remote authenticated users to execute arbitrary code via a crafted SQL statement.
CVE-2012-4856 1 Ibm 2 Power 5, Power 5 System Firmware 2017-08-29 7.9 HIGH N/A
The Service Processor in the IBM Power 5 91##-### and 940#-### before SF240_418_382 does not ensure that firewall code is executed, which allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2012-4853 1 Ibm 1 Websphere Application Server 2017-08-29 6.8 MEDIUM N/A
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere Application Server 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger information disclosure.
CVE-2012-4851 1 Ibm 1 Websphere Application Server 2017-08-29 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in IBM WebSphere Application Server 8.5 Liberty Profile before 8.5.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.
CVE-2012-4850 1 Ibm 1 Websphere Application Server 2017-08-29 7.5 HIGH N/A
IBM WebSphere Application Server 8.5 Liberty Profile before 8.5.0.1, when JAX-RS is used, does not properly validate requests, which allows remote attackers to gain privileges via unspecified vectors.
CVE-2012-4848 1 Ibm 1 Lotus Foundations Start 2017-08-29 3.5 LOW N/A
Multiple cross-site scripting (XSS) vulnerabilities in IBM Lotus Foundations Start before 1.2.2c allow remote authenticated users to inject arbitrary web script or HTML via a Webconfig Users user-attribute field, as demonstrated by the (1) First Name or (2) Last Name field.
CVE-2012-4847 1 Ibm 1 Cognos Business Intelligence 2017-08-29 4.0 MEDIUM N/A
IBM Cognos Business Intelligence (BI) 8.4 and 8.4.1 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted request containing a zero-valued byte.
CVE-2012-4846 1 Ibm 1 Lotus Notes 2017-08-29 4.3 MEDIUM N/A
IBM Lotus Notes 8.5.x before 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and SRAO8U3Q68.
CVE-2012-4844 1 Ibm 1 Lotus Domino 2017-08-29 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in the web server in IBM Lotus Domino 8.5.x through 8.5.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4842 1 Ibm 1 Lotus Domino 2017-08-29 5.8 MEDIUM N/A
Open redirect vulnerability in the web server in IBM Lotus Domino 8.5.x through 8.5.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
CVE-2012-4841 1 Ibm 1 Tivoli Endpoint Manager 2017-08-29 5.0 MEDIUM N/A
Unspecified vulnerability in Tivoli Endpoint Manager for Remote Control Broker 8.2 before 8.2.1-TIV-TEMRC821-IF0002 allows remote attackers to cause a denial of service (resource consumption) via unknown vectors.
CVE-2012-4840 1 Ibm 1 Cognos Business Intelligence 2017-08-29 5.0 MEDIUM N/A
IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to conduct XPath injection attacks, and call XPath extension functions, via unspecified vectors.
CVE-2012-4839 1 Ibm 1 Rational Clearquest 2017-08-29 4.3 MEDIUM N/A
The OSLC interface in the Web Client (aka CQ Web) in IBM Rational ClearQuest 7.1.2.x before 7.1.2.9 and 8.0.0.x before 8.0.0.5 allows remote attackers to conduct phishing attacks via a FRAME element.
CVE-2012-4837 1 Ibm 1 Cognos Business Intelligence 2017-08-29 4.0 MEDIUM N/A
IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote authenticated users to conduct XPath injection attacks, and read arbitrary XML files, via unspecified vectors.
CVE-2012-4836 1 Ibm 1 Cognos Business Intelligence 2017-08-29 3.5 LOW N/A
Cross-site scripting (XSS) vulnerability in IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted string that is not properly handled during rendering of stored data.
CVE-2012-4835 1 Ibm 1 Cognos Business Intelligence 2017-08-29 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4832 1 Ibm 2 Infosphere Business Glossary, Infosphere Information Server 2017-08-29 1.9 LOW N/A
Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 and InfoSphere Business Glossary 8.1.1 and 8.1.2 does not have an off autocomplete attribute for the password field on the login page, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
CVE-2012-4830 1 Ibm 1 Websphere Commerce 2017-08-29 5.0 MEDIUM N/A
Unspecified vulnerability in IBM WebSphere Commerce 6.0 through 6.0.0.11 and 7.0 through 7.0.0.6 allows remote attackers to obtain users' personal data via unknown vectors.
CVE-2012-4829 1 Ibm 1 Xiv Storage System Gen3 2017-08-29 4.3 MEDIUM N/A
IBM XIV Storage System Gen3 before 11.2 relies on a default X.509 v3 certificate for authentication, which allows man-in-the-middle attackers to spoof servers by leveraging an inappropriate certificate-trust relationship.