Page 7 of 38 results (0.020 seconds)

CVSS: 9.3EPSS: 0%CPEs: 17EXPL: 0

Multiple unspecified vulnerabilities in the (1) UNIX and (2) Linux backup-archive clients, and the (3) OS/400 API client, in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.6, 5.4 before 5.4.2, and 5.5 before 5.5.1, when the MAILPROG option is enabled, allow attackers to read, modify, or delete arbitrary files via unknown vectors. Múltiples vulnerabilidades sin especificar en (1) UNIX y (2) clientes Linux backup-archive, y (3)el cliente API de OS/400, en IBM Tivoli Storage Manager (TSM) v5.3 anteriores a v5.3.6.6, v5.4 anteriores a v5.4.2, y v5.5 anteriores a v5.5.1, • http://secunia.com/advisories/32534 http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 http://www.vupen.com/english/advisories/2009/3132 •

CVSS: 9.3EPSS: 96%CPEs: 27EXPL: 1

Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet. Un desbordamiento de búfer en la región stack de la memoria en el planificador del demonio de aceptación de cliente (CAD) en el cliente en Tivoli Storage Manager (TSM) versiones 5.3 anteriores a 5.3.6.7, versiones 5.4 anteriores a 5.4.3, versiones 5.5 anteriores a 5.5.2.2, y versiones 6.1 anteriores a 6.1.0.2, y TSM Express versiones 5.3.3.0 hasta 5.3.6.6, de IBM, permite a los atacantes remotos ejecutar código arbitrario por medio de datos especialmente diseñados en un paquete TCP. • https://www.exploit-db.com/exploits/16421 http://secunia.com/advisories/32534 http://secunia.com/secunia_research/2008-51 http://securitytracker.com/id?1023136 http://www-01.ibm.com/support/docview.wss?uid=swg1IC61036 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 http://www.securityfocus.com/archive/1/507654/100/0/threaded http://www.vupen.com/english/advisories/2009/3132 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in the server in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.2 and 6.x before 6.1 has unknown impact and attack vectors related to the "admin command line." Vulnerabilidad no especificada en el servidor en IBM Tivoli Storage Manager (TSM) 5.3.x versiones anteriores a v5.3.2 y 6.x versiones anteriores a v6.1 tiene un impacto desconocido y vectores de ataque relacionados a la "línea de comandos del administrador". • http://secunia.com/advisories/34498 http://securitytracker.com/id?1021945 http://www-01.ibm.com/support/docview.wss?uid=swg21246076 http://www-01.ibm.com/support/docview.wss?uid=swg21375360 http://www-1.ibm.com/support/docview.wss?uid=swg1IC46744 http://www.securityfocus.com/bid/34285 http://www.vupen.com/english/advisories/2009/0881 •

CVSS: 3.5EPSS: 0%CPEs: 11EXPL: 0

The server in IBM Tivoli Storage Manager (TSM) 5.1.x, 5.2.x before 5.2.1.2, and 6.x before 6.1 does not require credentials to observe the server console in some circumstances, which allows remote authenticated administrators to monitor server operations by establishing a console mode session, related to "session exposure." El servidor en IBM Tivoli Storage Manager (TSM) v5.1.x, v5.2.x anteriores a v5.2.1.2, y v6.x anteriores a v6.1, no requiere credenciales para ver la consola del servidor en algunas circunstancias, lo que permite a administradores autenticados en remoto monitorizar las operaciones del servidor estableciendo una sesión en modo consola, relativo a una "exposición de sesión". • http://secunia.com/advisories/34498 http://securitytracker.com/id?1021947 http://www-01.ibm.com/support/docview.wss?uid=swg21375360 http://www-1.ibm.com/support/docview.wss?uid=swg1IC37554 http://www.securityfocus.com/bid/34285 http://www.vupen.com/english/advisories/2009/0881 https://exchange.xforce.ibmcloud.com/vulnerabilities/49536 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 1%CPEs: 18EXPL: 0

The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1. El servidor en IBM Tivoli Storage Manager (TSM) 4.2.x en MVS, 5.1.9.x versiones anteriores a v5.1.9.1, 5.1.x versiones anteriores a v5.1.10, 5.2.2.x versiones anteriores a v5.2.2.3, 5.2.x versiones anteriores a v5.2.3, 5.3.x versiones anteriores a v5.3.0, y 6.x versiones anteriores a v6.1, cuando el método de comunicación HTTP está activo, permite a atacantes remotos provocar una denegación de servicio (caída del demonio o cuelgue) a través de tráfico HTTP sin especificar, como lo demostrador por el escáner de puertos de IBM v1.3.1. • http://secunia.com/advisories/34498 http://securitytracker.com/id?1021946 http://www-01.ibm.com/support/docview.wss?uid=swg21246076 http://www-01.ibm.com/support/docview.wss?uid=swg21375360 http://www-1.ibm.com/support/docview.wss?uid=swg1IC39395 http://www.securityfocus.com/bid/34285 http://www.vupen.com/english/advisories/2009/0881 https://exchange.xforce.ibmcloud.com/vulnerabilities/49535 •