Page 2 of 8 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

The client applications in the DataStage Administrator client in InfoSphere DataStage in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 rely on client-side access control, which allows remote authenticated users to gain privileges via unspecified vectors. La aplicación cliente en el DataStage Administrator client in InfoSphere DataStage en IBM InfoSphere Information Server v8.1, v8.5 anterior a FP3, y v8.7 confia en el control de acceso del lado del cliente, lo que permite a usuarios remotos autenticados ganar privielgios mediante vectores desconocidos. • http://www-01.ibm.com/support/docview.wss?uid=swg21623501 https://exchange.xforce.ibmcloud.com/vulnerabilities/73285 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

IBM InfoSphere Information Server 8.5 and 8.5.0.1 on Unix and Linux, as used in IBM InfoSphere DataStage 8.5 and 8.5.0.1 and other products, assigns incorrect ownership to unspecified files, which allows local users to gain privileges via unknown vectors. IBM InfoSphere Information Server 8.5 y 8.5.0.1 en Unix y Linux, tal como se usa en IBM InfoSphere DataStage 8.5 y 8.5.0.1 y otros productos, asigna incorrectamente la propiedad de fiheros sin especificar, lo que permite a usuarios locales escalar privilegios a través de vectores desconocidos. • http://secunia.com/advisories/45036 http://www-01.ibm.com/support/docview.wss?uid=swg1JR39769 http://www.ibm.com/support/docview.wss?uid=swg21504279 http://www.ibm.com/support/docview.wss?uid=swg24030333 http://www.securityfocus.com/bid/48516 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

IBM InfoSphere Information Server 8.5 and 8.5.0.1 on Unix and Linux, as used in IBM InfoSphere DataStage 8.5 and 8.5.0.1 and other products, uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. IBM InfoSphere Information Server v8.5 y v8.5.0.1 de Unix y Linux, como los utilizados en IBM InfoSphere DataStage v8.5 y v8.5.0.1 y otros productos, utiliza permisos débiles para los archivos especificados, lo que permite a usuarios locales conseguir privilegios a través de vectores desconocidos. • http://secunia.com/advisories/45036 http://www-01.ibm.com/support/docview.wss?uid=swg1JR39769 http://www.ibm.com/support/docview.wss?uid=swg21504279 http://www.ibm.com/support/docview.wss?uid=swg24030333 http://www.securityfocus.com/bid/48516 • CWE-264: Permissions, Privileges, and Access Controls •