Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm spectrum protect server vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-22394
The IBM Spectrum Protect 8.1.14.000 server could allow a remote malicious user to bypass security restrictions, caused by improper enforcement of access controls. By signing in, an attacker could exploit this vulnerability to bypass security and gain unauthorized administrator or...
Ibm Spectrum Protect 8.1.14.100
3.3
CVSSv3
CVE-2020-4591
IBM Spectrum Protect Server 8.1.0.000 up to and including 8.1.10.000 could disclose sensitive information in nondefault settings due to occasionally not encrypting the second chunk of an object in an encrypted container pool. IBM X-Force ID: 184746.
Ibm Spectrum Protect Server
6.5
CVSSv3
CVE-2022-22496
While a user account for the IBM Spectrum Protect Server 8.1.0.000 up to and including 8.1.14 is being established, it may be configured to use SESSIONSECURITY=TRANSITIONAL. While in this mode, it may be susceptible to an offline dictionary attack. IBM X-Force ID: 226942.
Ibm Spectrum Protect Server
8.1
CVSSv3
CVE-2021-39057
IBM Spectrum Protect Plus 10.1.0.0 up to and including 10.1.8.x is vulnerable to server-side request forgery (SSRF). This may allow an authenticated malicious user to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other atta...
Ibm Spectrum Protect Plus
4.4
CVSSv3
CVE-2021-20491
IBM Spectrum Protect Server 7.1 and 8.1 is subject to a stack-based buffer overflow caused by improper bounds checking during the parsing of commands. By issuing such a command with an improper parameter, an authorized administrator could overflow a buffer and cause the server to...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3