Ibm

I

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 24.02.2025 02:15:31
  • Zuletzt bearbeitet 03.07.2025 20:52:55

IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege...

  • EPSS 0.1%
  • Veröffentlicht 14.02.2025 15:15:09
  • Zuletzt bearbeitet 03.07.2025 20:54:07

IBM i 7.4 and 7.5 is vulnerable to a database access denial of service caused by a bypass of a database capabilities restriction check. A privileged bad actor can remove or otherwise impact database infrastructure files resulting in incorrect behavio...

  • EPSS 0.02%
  • Veröffentlicht 24.01.2025 18:15:31
  • Zuletzt bearbeitet 29.09.2025 16:15:33

IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered t...

  • EPSS 0.05%
  • Veröffentlicht 03.01.2025 23:15:08
  • Zuletzt bearbeitet 20.06.2025 18:11:09

IBM PowerHA SystemMirror for i 7.4 and 7.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user ...

  • EPSS 0.07%
  • Veröffentlicht 03.01.2025 23:15:08
  • Zuletzt bearbeitet 19.08.2025 13:35:26

IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames.  This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system.

  • EPSS 0.89%
  • Veröffentlicht 21.12.2024 14:15:21
  • Zuletzt bearbeitet 03.11.2025 23:17:14

IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed...

  • EPSS 0.65%
  • Veröffentlicht 21.12.2024 14:15:21
  • Zuletzt bearbeitet 03.11.2025 23:17:14

IBM i 7.3, 7.4, and 7.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

  • EPSS 0.07%
  • Veröffentlicht 18.12.2024 11:15:05
  • Zuletzt bearbeitet 03.07.2025 20:54:13

IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical f...

  • EPSS 0.07%
  • Veröffentlicht 08.07.2024 02:15:01
  • Zuletzt bearbeitet 21.11.2024 09:25:23

IBM System Management for i 7.2, 7.3, and 7.4 could allow a local user to gain elevated privileges due to an unqualified library program call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: ...

  • EPSS 0.04%
  • Veröffentlicht 21.06.2024 10:15:12
  • Zuletzt bearbeitet 17.07.2025 20:03:37

IBM i 7.3, 7.4, and 7.5 product IBM TCP/IP Connectivity Utilities for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the hos...