CVE Vulnerabilities for "product:aix"
Showing 1-10 of 792 CVEs (filtered from 316,443 total)
IBM MQ 9.1, 9.2, 9.3, 9.4 LTS and 9.3, 9.4 CD is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service.
IBM Sterling B2B Integrator 6.2.0.0 through 6.2.0.5, and 6.2.1.0 and IBM Sterling File Gateway 6.2.0.0 through 6.2.0.5, and 6.2.1.0 stores user credentials in configuration files which can be read by a local user.
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to spoof email identity of the sender due to improper verification of source data.
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete reviews from other users due to client-side enforcement of server-side security.
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete comments from other users due to client-side enforcement of server-side security.
IBM AIX 7.2, 7.3, IBM VIOS 3.1, and 4.1, when configured to use Kerberos network authentication, could allow a local user to write to files on the system with root privileges due to improper initialization of critical variables.
IBM WebSphere Application Server Liberty 18.0.0.2 through 25.0.0.8 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources.
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for TLS connections.
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.
| Description | Year | ||||
|---|---|---|---|---|---|
| 7.5HIGH | 0.1%Minimal | - | 2025 | ||
| 5.5MEDIUM | 0.0%Minimal | - | 2025 | ||
| 6.5MEDIUM | 0.0%Minimal | - | 2025 | ||
| 5.7MEDIUM | 0.0%Minimal | - | 2025 | ||
| 3.5LOW | 0.0%Minimal | - | 2025 | ||
| 3.5LOW | 0.0%Minimal | - | 2025 | ||
| 7.4HIGH | 0.0%Minimal | - | 2025 | ||
| 5.3MEDIUM | 0.1%Minimal | - | 2025 | ||
| 5.3MEDIUM | 0.0%Minimal | - | 2025 | ||
| 5.4MEDIUM | 0.0%Minimal | - | 2025 |