Ibm

I

29 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 24.01.2025 18:15:31
  • Last modified 29.09.2025 16:15:33

IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered t...

  • EPSS 0.04%
  • Published 03.01.2025 23:15:08
  • Last modified 20.06.2025 18:11:09

IBM PowerHA SystemMirror for i 7.4 and 7.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user ...

  • EPSS 0.07%
  • Published 03.01.2025 23:15:08
  • Last modified 19.08.2025 13:35:26

IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames.  This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system.

  • EPSS 0.62%
  • Published 21.12.2024 14:15:21
  • Last modified 03.07.2025 20:54:12

IBM i 7.3, 7.4, and 7.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

  • EPSS 0.83%
  • Published 21.12.2024 14:15:21
  • Last modified 03.07.2025 20:54:10

IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed...

  • EPSS 0.06%
  • Published 18.12.2024 11:15:05
  • Last modified 03.07.2025 20:54:13

IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical f...

  • EPSS 0.04%
  • Published 08.07.2024 02:15:01
  • Last modified 21.11.2024 09:25:23

IBM System Management for i 7.2, 7.3, and 7.4 could allow a local user to gain elevated privileges due to an unqualified library program call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: ...

  • EPSS 0.04%
  • Published 21.06.2024 10:15:12
  • Last modified 17.07.2025 20:03:37

IBM i 7.3, 7.4, and 7.5 product IBM TCP/IP Connectivity Utilities for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the hos...

  • EPSS 0.06%
  • Published 15.06.2024 14:15:09
  • Last modified 21.11.2024 09:14:03

IBM Db2 for i 7.2, 7.3, 7.4, and 7.5 supplies user defined table function is vulnerable to user enumeration by a local authenticated attacker, without having authority to the related *USRPRF objects. This can be used by a malicious actor to gather i...

  • EPSS 0.05%
  • Published 15.06.2024 14:15:09
  • Last modified 29.09.2025 15:16:06

IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability caused by an insufficient authority requirement. A local user without administrator privilege can configure a physical file trigger to execute with the privileges of a u...