Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm maximo asset management 7.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2017-1175
IBM Maximo Asset Management 7.1, 7.5, and 7.6 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database. IBM X-Force ID: 123297.
Ibm Maximo Asset Management 7.1.1
Ibm Maximo Asset Management 7.6
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management 7.5
7.5
CVSSv2
CVE-2013-5395
IBM Maximo Asset Management 6.2 up to and including 6.2.8, 7.1 prior to 7.1.1.12, and 7.5 prior to 7.5.0.5 allows remote malicious users to bypass intended access restrictions via unspecified vectors.
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management 7.1.1.6
Ibm Maximo Asset Management 7.1.1.7
Ibm Maximo Asset Management 7.1.1.10
Ibm Maximo Asset Management 7.1.1.11
Ibm Maximo Asset Management 7.1.1.2
Ibm Maximo Asset Management 7.1.1.5
Ibm Maximo Asset Management 7.1.1
Ibm Maximo Asset Management 7.1.1.1
Ibm Maximo Asset Management 7.1.1.8
Ibm Maximo Asset Management 7.1.1.9
Ibm Maximo Asset Management 7.5.0.2
Ibm Maximo Asset Management 7.5.0.0
Ibm Maximo Asset Management 7.5.0.3
Ibm Maximo Asset Management 7.5.0.4
Ibm Maximo Asset Management 7.5.0.1
Ibm Maximo Asset Management 6.2.3
Ibm Maximo Asset Management 6.2.2
Ibm Maximo Asset Management 6.2.6.1
Ibm Maximo Asset Management 6.2.6
Ibm Maximo Asset Management 6.2.5
Ibm Maximo Asset Management 6.2.4
6.8
CVSSv2
CVE-2013-3323
A Privilege Escalation Vulnerability exists in IBM Maximo Asset Management 7.5, 7.1, and 6.2, when WebSeal with Basic Authentication is used, due to a failure to invalidate the authentication session, which could let a malicious user obtain unauthorized access.
Ibm Change And Configuration Management Database 7.1
Ibm Change And Configuration Management Database 7.2
Ibm Maximo Asset Management 6.2
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management 7.5
Ibm Maximo Asset Management Essentials 6.2
Ibm Maximo Asset Management Essentials 7.1
Ibm Maximo Asset Management Essentials 7.5
Ibm Maximo For Government 6.2
Ibm Maximo For Government 7.1
Ibm Maximo For Government 7.5
Ibm Maximo For Life Sciences 6.2
Ibm Maximo For Life Sciences 6.4
Ibm Maximo For Life Sciences 6.5
Ibm Maximo For Life Sciences 7.1
Ibm Maximo For Life Sciences 7.5
Ibm Maximo For Nuclear Power 6.2
Ibm Maximo For Nuclear Power 6.3
Ibm Maximo For Nuclear Power 7.1
Ibm Maximo For Nuclear Power 7.5
Ibm Maximo For Oil And Gas 6.2
Ibm Maximo For Oil And Gas 6.3
6.8
CVSSv2
CVE-2016-9976
IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a remote malicious user to include arbitrary files. A remote attacker could send a specially-crafted URL request, which could allow the malicious user to execute arbitrary code on the vulnerable server. IBM X-Force ID: 120...
Ibm Maximo Asset Management 7.5
Ibm Maximo Asset Management Essentials 7.1
Ibm Maximo Asset Management Essentials 7.5
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management 7.6
6.8
CVSSv2
CVE-2012-3323
IBM Maximo Asset Management 6.2 prior to 6.2.8, 7.1 prior to 7.1.1.12, and 7.5 prior to 7.5.0.3 allows remote malicious users to gain privileges via unspecified vectors.
Ibm Maximo Asset Management 6.2.7
Ibm Maximo Asset Management 6.2.6.1
Ibm Maximo Asset Management 6.2
Ibm Maximo Asset Management 6.2.4
Ibm Maximo Asset Management 6.2.3
Ibm Maximo Asset Management 6.2.2
Ibm Maximo Asset Management 6.2.1
Ibm Maximo Asset Management 6.2.6
Ibm Maximo Asset Management 6.2.5
Ibm Maximo Asset Management 7.5.0.0
Ibm Maximo Asset Management 7.5.0.1
Ibm Maximo Asset Management 7.5.0.2
Ibm Maximo Asset Management 7.1.1.1
Ibm Maximo Asset Management 7.1.1.10
Ibm Maximo Asset Management 7.1.1.5
Ibm Maximo Asset Management 7.1.1.6
Ibm Maximo Asset Management 7.1.1.7
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management 7.1.1
Ibm Maximo Asset Management 7.1.1.8
Ibm Maximo Asset Management 7.1.1.9
Ibm Maximo Asset Management 7.1.1.11
6.8
CVSSv2
CVE-2012-2183
Session fixation vulnerability in IBM Maximo Asset Management 6.2 up to and including 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows rem...
Ibm Tivoli Asset Management For It 7.1
Ibm Tivoli Asset Management For It 7.2
Ibm Maximo Asset Management 7.5.0.0
Ibm Maximo Asset Management 6.2.0.0
Ibm Smartcloud Control Desk 7.0
Ibm Tivoli Asset Management For It 6.2
Ibm Change And Configuration Management Database 6.0
Ibm Change And Configuration Management Database 7.0
Ibm Tivoli Service Request Manager 7.0
Ibm Maximo Service Desk 6.2
Ibm Tivoli Asset Management For It 7.0
Ibm Tivoli Asset Management For It 6.0
Ibm Maximo Asset Management 7.1.0.0
6.8
CVSSv2
CVE-2012-0714
Cross-site request forgery (CSRF) vulnerability in IBM Maximo Asset Management 6.2 up to and including 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (C...
Ibm Maximo Asset Management 7.5.0.0
Ibm Smartcloud Control Desk 7.0
Ibm Maximo Service Desk 6.2
Ibm Change And Configuration Management Database 6.0
Ibm Tivoli Asset Management For It 6.0
Ibm Tivoli Service Request Manager 7.0
Ibm Tivoli Asset Management For It 7.2
Ibm Tivoli Asset Management For It 7.0
Ibm Maximo Asset Management 6.2.0.0
Ibm Tivoli Asset Management For It 6.2
Ibm Tivoli Asset Management For It 7.1
Ibm Change And Configuration Management Database 7.0
Ibm Maximo Asset Management 7.1.0.0
6.8
CVSSv2
CVE-2012-2184
Session fixation vulnerability in IBM Maximo Asset Management 7.1 up to and including 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows rem...
Ibm Tivoli Asset Management For It 7.0
Ibm Tivoli Asset Management For It 6.0
Ibm Tivoli Asset Management For It 7.1
Ibm Tivoli Asset Management For It 7.2
Ibm Maximo Asset Management 7.5.0.0
Ibm Maximo Asset Management 7.1.0.0
Ibm Smartcloud Control Desk 7.0
Ibm Tivoli Asset Management For It 6.2
Ibm Change And Configuration Management Database 6.0
Ibm Change And Configuration Management Database 7.0
Ibm Tivoli Service Request Manager 7.0
Ibm Maximo Service Desk 6.2
6.8
CVSSv2
CVE-2011-1397
Cross-site request forgery (CSRF) vulnerability in the Labor Reporting page in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5; IBM Tivoli Asset Management for IT 6.2, 7.1, and 7.2; IBM Tivoli Service Request Manager 7.1 and 7.2; IBM Maximo Service D...
Ibm Maximo Asset Management 6.2
Ibm Maximo Asset Management 7.5
Ibm Maximo Asset Management 7.1
Ibm Maximo Asset Management Essentials 7.5
Ibm Maximo Asset Management Essentials 6.2
Ibm Maximo Asset Management Essentials 7.1
Ibm Tivoli Asset Management For It 7.1
Ibm Tivoli Asset Management For It 7.2
Ibm Tivoli Asset Management For It 6.2
Ibm Trivoli Service Request Manager 7.1
Ibm Trivoli Service Request Manager 7.2
Ibm Maximo Service Desk 6.2
Ibm Tivoli Change And Configuration Management Database 6.2
Ibm Tivoli Change And Configuration Management Database 7.1
Ibm Tivoli Change And Configuration Management Database 7.2
6.5
CVSSv2
CVE-2016-9977
IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a remote malicious user to hijack a user's session, caused by the failure to invalidate an existing session identifier. An attacker could exploit this vulnerability to gain access to another user's session. IBM X...
Ibm Maximo Asset Management 7.5
Ibm Maximo Asset Management 7.6
Ibm Maximo Asset Management Essentials 7.1
Ibm Maximo Asset Management Essentials 7.5
Ibm Maximo Asset Management 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
IMAP
CVE-2024-4367
server-side request forgery
information disclosure
CVE-2024-34342
CVE-2024-4281
CVE-2024-3507
CVE-2024-25560
CVE-2024-34574
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »