Security
Headlines
HeadlinesLatestCVEs

Tag

#ibm

CVE-2011-4820: IBM Rational Asset Manager security bypass CVE-2011-4820 Vulnerability Report

IBM Rational Asset Manager 7.5 could allow a remote attacker to bypass security restrictions. An attacker could exploit this vulnerability using the UID parameter to modify another user's preferences.

CVE
#vulnerability#ibm
CVE-2022-35722: IBM Jazz for Service Management is vulnerable to stored cross-site scripting (CVE-2022-35722)

IBM Jazz for Service Management is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231381.

CVE-2022-35282: IBM WebSphere Application Server server-side request forgery CVE-2022-35282 Vulnerability Report

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, an attacker with local network access could exploit this vulnerability to obtain sensitive data.

CVE-2022-36771: IBM QRadar User Behavior Analytics information disclosure CVE-2022-36771 Vulnerability Report

IBM QRadar User Behavior Analytics could allow an authenticated user to obtain sensitive information from that they should not have access to. IBM X-Force ID: 232791.

CVE-2022-22387: IBM Application Gateway cross-site scripting CVE-2022-22387 Vulnerability Report

IBM Application Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 221965.

CVE-2022-40912: Zero Science Lab » ETAP Safety Manager 1.0.0.32 Remote Unauthenticated Reflected XSS

ETAP Lighting International NV ETAP Safety Manager 1.0.0.32 is vulnerable to Cross Site Scripting (XSS). Input passed to the GET parameter 'action' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.

When Will Cybersecurity Get Its Bloomberg Terminal?

The "single pane of glass" that gathers and correlates all the information security professionals need doesn't exist, so it's up to us to create it.

Red Hat Shares ― Edge computing: Security

The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.

4 Data Security Best Practices You Should Know

There are numerous strategies to lessen the possibility and effects of a cyberattack, but doing so takes careful planning and targeted action.

Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market

Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular.