Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm infosphere information server 8.7 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4056
Cross-site request forgery (CSRF) vulnerability in the Data Quality Console and Information Analyzer components in IBM InfoSphere Information Server 8.7 through FP2 and 9.1 up to and including 9.1.2.0 allows remote malicious users to hijack the authentication of arbitrary users.
Ibm Infosphere Information Server 8.7.0.2
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.7.0.1
Ibm Infosphere Information Server 9.1.2
Ibm Infosphere Information Server 9.1.0.1
Ibm Infosphere Information Server 9.1
NA
CVE-2012-0205
InfoSphere Metadata Workbench (MWB) 8.1 up to and including 8.7 in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 does not properly restrict use of the troubleshooting feature, which allows remote authenticated users to bypass intended access restrictions or cause...
Ibm Infosphere Metadata Workbench 8.1.2
Ibm Infosphere Metadata Workbench 8.5
Ibm Infosphere Information Server 8.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Metadata Workbench 8.7
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Metadata Workbench 8.1
Ibm Infosphere Metadata Workbench 8.1.1
6.1
CVSSv3
CVE-2016-5984
IBM InfoSphere Information Server is vulnerable to cross-frame scripting, caused by insufficient HTML iframe protection. A remote attacker could exploit this vulnerability using a specially-crafted URL to navigate to a web page the attacker controls. An attacker could use this vu...
Ibm Infosphere Information Server 11.5
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server On Cloud 11.5
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 11.3
NA
CVE-2012-0702
Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 does not properly determine authorization, which allows remote authenticated users to gain privileges via unspecified vectors.
Ibm Infosphere Information Server 8.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server Information Services Framework -
NA
CVE-2012-0703
Open redirect vulnerability in Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Ibm Infosphere Information Server Information Services Framework -
Ibm Infosphere Information Server 8.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server 8.7
NA
CVE-2012-0705
InfoSphere Import Export Manager in InfoSphere Information Server MetaBrokers & Bridges (MBB) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, 8.7, and 9.1 does not validate unspecified input data, which allows remote authenticated users to execute arbitrary commands...
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server Metabrokers \\& Bridges -
Ibm Infosphere Information Server 8.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server 8.5.0.1
NA
CVE-2013-4066
IBM InfoSphere Information Server 8.0, 8.1, 8.5 through FP3, 8.7, and 9.1 allows remote malicious users to conduct clickjacking attacks by creating an overlay interface on top of the Web Console interface.
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.0
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server 8.5.0.3
Ibm Infosphere Information Server 8.1
NA
CVE-2013-4067
IBM InfoSphere Information Server 8.0, 8.1, 8.5 through FP3, 8.7, and 9.1 allows remote malicious users to hijack sessions and read cookie values, or conduct phishing attacks to capture credentials, via unspecified vectors.
Ibm Infosphere Information Server 8.0
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.5.0.3
Ibm Infosphere Information Server 8.1
NA
CVE-2013-3040
IBM InfoSphere Information Server up to and including 8.5 FP3, 8.7 through FP2, and 9.1 produces login-failure messages indicating whether the username or password is incorrect, which allows remote malicious users to enumerate user accounts via a brute-force attack.
Ibm Infosphere Information Server 8.5.0.2
Ibm Infosphere Information Server 8.5.0.3
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.7.0.1
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server 8.7.0.2
Ibm Infosphere Information Server 8.5.0.1
NA
CVE-2013-0502
Cross-site scripting (XSS) vulnerability in IBM InfoSphere Information Server 8.1, 8.5 through FP3, 8.7 through FP2, and 9.1 allows remote malicious users to inject arbitrary web script or HTML via a malformed URL.
Ibm Infosphere Information Server 8.7.0.1
Ibm Infosphere Information Server 8.7.0.2
Ibm Infosphere Information Server 8.5.0.3
Ibm Infosphere Information Server 8.7
Ibm Infosphere Information Server 8.1
Ibm Infosphere Information Server 9.1
Ibm Infosphere Information Server 8.5
Ibm Infosphere Information Server 8.5.0.1
Ibm Infosphere Information Server 8.5.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »