Page 2 of 8 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the CAD service in IBM Tivoli Storage Manager (TSM) Client 5.3.5.3 and 5.4.1.2 for Windows allows remote attackers to inject arbitrary web script or HTML via HTTP requests to port 1581, which generate log entries in a dsmerror.log file that is accessible through a certain web interface. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el servicio CAD de IBM Tivoli Storage Manager (TSM) Client 5.3.5.3 y 5.4.1.2 para Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante peticiones HTTP al puerto 1581, lo cual genera entradas de registro en el fichero dsmerror.log, el cual es accesible a través de cierta inferfaz web. • http://secunia.com/advisories/27013 http://secunia.com/secunia_research/2007-75/advisory http://www.securityfocus.com/bid/26221 http://www.securitytracker.com/id?1018868 http://www.vupen.com/english/advisories/2007/3635 https://exchange.xforce.ibmcloud.com/vulnerabilities/38125 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 96%CPEs: 8EXPL: 2

Buffer overflow in the Client Acceptor Daemon (CAD), dsmcad.exe, in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2 allows remote attackers to execute arbitrary code via crafted HTTP headers, aka IC52905. Desbordamiento de búfer en el Demonio Aceptador de Clientes (Client Acceptor Daemon o CAD), dsmcad.exe, en determinados clientes IBM Tivoli Storage Manager (TSM) 5.1 anterior a 5.1.8.1, 5.2 anterior a 5.2.5.2, 5.3 anterior a 5.3.5.3, y 5.4 anterior a 5.4.1.2 permite a atacantes remotos ejecutar código de su elección mediante cabeceras HTTP manipuladas, también conocida como IC52905. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express. Authentication is not required to exploit this vulnerability. The specific flaw exists in the dsmcad.exe process bound by default on TCP port 1581. During HTTP header parsing, a host parameter of sufficient length will trigger an overflow through a call to vswprintf(). • https://www.exploit-db.com/exploits/16764 https://www.exploit-db.com/exploits/4573 http://osvdb.org/38161 http://secunia.com/advisories/26883 http://securityreason.com/securityalert/3184 http://www-1.ibm.com/support/docview.wss?uid=swg21268775 http://www-1.ibm.com/support/search.wss?rs=0&q=IC52905&apar=only http://www.securityfocus.com/archive/1/480492 http://www.securityfocus.com/bid/25743 http://www.securitytracker.com/id?1018725 http://www.vupen.com/english/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 3%CPEs: 4EXPL: 0

Unspecified vulnerability in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2, when using "server-initiated prompted scheduling," allows remote attackers to read a client's data, aka IC53616. Vulnerabilidad no especificada en determinados clientes IBM Tivoli Storage Manager (TSM) 5.1 versiones anteriores a 5.1.8.1, 5.2 versiones anteriores a 5.2.5.2, 5.3 versiones anteriores a 5.3.5.3, y 5.4 versiones anteriores a 5.4.1.2, cuando se utiliza "programación de tareas solicitado en tiempo de iniciación de servidor", permite a atacantes remotos leer datos del cliente, también conocido como IC53616. • http://osvdb.org/38162 http://secunia.com/advisories/26883 http://www-1.ibm.com/support/docview.wss?uid=swg21268775 http://www-1.ibm.com/support/search.wss?rs=0&q=IC53616&apar=only http://www.securityfocus.com/bid/25743 http://www.securitytracker.com/id?1018725 http://www.vupen.com/english/advisories/2007/3228 https://exchange.xforce.ibmcloud.com/vulnerabilities/36701 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •