Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security guardium 8.2 vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2012-3338
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote malicious user to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-F...
Ibm Infosphere Guardium 8.0
Ibm Infosphere Guardium 8.01
Ibm Infosphere Guardium 8.2
5.4
CVSSv3
CVE-2012-3341
IBM InfoSphere Guardium 7.0, 8.0, 8.01, and 8.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within th...
Ibm Infosphere Guardium 7.00
Ibm Infosphere Guardium 8.0
Ibm Infosphere Guardium 8.0.1
Ibm Infosphere Guardium 8.2
7.4
CVSSv3
CVE-2017-1122
IBM Security Guardium 8.2, 9.0, and 10.0 contains a vulnerability that could allow a local attacker with CLI access to inject arbitrary commands which would be executed as root. IBM X-Force ID: 121174.
Ibm Security Guardium 9.5
Ibm Security Guardium 10.0
Ibm Security Guardium 10.0.1
Ibm Security Guardium 10.1
Ibm Security Guardium 9.0
Ibm Security Guardium 9.1
Ibm Security Guardium 8.2
Ibm Security Guardium 10.1.2
7.8
CVSSv3
CVE-2016-6065
IBM Security Guardium Database Activity Monitor appliance could allow a local user to inject commands that would be executed as root.
Ibm Security Guardium 10.1.2
Ibm Security Guardium 10.0
Ibm Security Guardium 10.0.1
Ibm Security Guardium 10.1
Ibm Security Guardium 9.1
Ibm Security Guardium 8.2
Ibm Security Guardium 9.0
Ibm Security Guardium 9.5
3.7
CVSSv3
CVE-2016-0240
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 does not enable the HSTS protection mechanism, which makes it easier for remote malicious users to obtain sensitive information ...
Ibm Security Guardium Database Activity Monitor 9.1
Ibm Security Guardium Database Activity Monitor 9.0
Ibm Security Guardium Database Activity Monitor 8.2
Ibm Security Guardium Database Activity Monitor 10.1
Ibm Security Guardium Database Activity Monitor 10.01
Ibm Security Guardium Database Activity Monitor 10.0
Ibm Security Guardium Database Activity Monitor 9.5
7.8
CVSSv3
CVE-2016-0328
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 allows local users to obtain administrator privileges for command execution via unspecified vectors.
Ibm Security Guardium Database Activity Monitor 10.1
Ibm Security Guardium Database Activity Monitor 9.1
Ibm Security Guardium Database Activity Monitor 9.0
Ibm Security Guardium Database Activity Monitor 8.2
Ibm Security Guardium Database Activity Monitor 10.0
Ibm Security Guardium Database Activity Monitor 10.01
Ibm Security Guardium Database Activity Monitor 9.5
8.8
CVSSv3
CVE-2016-0241
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 allows remote authenticated users to spoof administrator accounts by sending a modified login request over HTTP.
Ibm Security Guardium Database Activity Monitor 9.0
Ibm Security Guardium Database Activity Monitor 9.1
Ibm Security Guardium Database Activity Monitor 8.2
Ibm Security Guardium Database Activity Monitor 10.1
Ibm Security Guardium Database Activity Monitor 10.01
Ibm Security Guardium Database Activity Monitor 9.5
Ibm Security Guardium Database Activity Monitor 10.0
6.1
CVSSv3
CVE-2016-0246
Cross-site scripting (XSS) vulnerability in IBM Security Guardium 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 allows remote malicious users to inject arbitrary web script or HTML via a crafted URL.
Ibm Security Guardium 9.1
Ibm Security Guardium 9.0
Ibm Security Guardium 10.1
Ibm Security Guardium 10.01
Ibm Security Guardium 8.2
Ibm Security Guardium 10.0
Ibm Security Guardium 9.5
7.8
CVSSv3
CVE-2016-0247
IBM Security Guardium 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 allows local users to obtain sensitive cleartext information via unspecified vectors, as demonstrated by password information.
Ibm Security Guardium 9.1
Ibm Security Guardium 9.5
Ibm Security Guardium 10.1
Ibm Security Guardium 10.01
Ibm Security Guardium 10.0
Ibm Security Guardium 8.2
Ibm Security Guardium 9.0
8.8
CVSSv3
CVE-2016-0236
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x up to and including 9.5 before p700, and 10.x up to and including 10.1 before p100 allows remote authenticated users to execute arbitrary commands with root privileges via the search field.
Ibm Security Guardium Database Activity Monitor 10.0
Ibm Security Guardium Database Activity Monitor 8.2
Ibm Security Guardium Database Activity Monitor 10.1
Ibm Security Guardium Database Activity Monitor 10.01
Ibm Security Guardium Database Activity Monitor 9.5
Ibm Security Guardium Database Activity Monitor 9.0
Ibm Security Guardium Database Activity Monitor 9.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »