RSS   Vulnerabilities for 'Bigfix inventory'   RSS

2019-06-28
 
CVE-2019-4369

CWE-200
 

 
IBM BigFix Inventory v9 (SUA v9 / ILMT v9) discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161807.

 
2017-07-13
 
CVE-2016-8964

CWE-254
 

 
IBM BigFix Inventory v9 9.2 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 118853.

 
2017-04-26
 
CVE-2016-8962

 

 
IBM BigFix Inventory 9.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 118851.

 
2017-02-01
 
CVE-2016-8977

 

 
IBM BigFix Inventory v9 could disclose sensitive information to an unauthorized user using HTTP GET requests. This information could be used to mount further attacks against the system.

 
 
CVE-2016-8967

 

 
IBM BigFix Inventory v9 9.2 stores user credentials in plain in clear text which can be read by a local user.

 
 
CVE-2016-8963

 

 
IBM BigFix Inventory v9 stores potentially sensitive information in log files that could be read by a local user.

 
 
CVE-2016-8981

 

 
IBM BigFix Inventory v9 allows web pages to be stored locally which can be read by another user on the system.

 
 
CVE-2016-8980

 

 
IBM BigFix Inventory v9 is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources.

 
 
CVE-2016-8966

 

 
IBM BigFix Inventory v9 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.

 
 
CVE-2016-8961

 

 
IBM BigFix Inventory v9 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.

 


Copyright 2024, cxsecurity.com

 

Back to Top