Ibm Spectrum Protect For Space Management vulnerabilities
8 known vulnerabilities affecting ibm/spectrum_protect_for_space_management.
Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2023-33832MEDIUMCVSS 4.7≥ 8.1.0.0, ≤ 8.1.17.02023-07-19
CVE-2023-33832 [MEDIUM] CWE-20 CVE-2023-33832: IBM Spectrum Protect 8.1.0.0 through 8.1.17.0 could allow a local user to cause a denial of service
IBM Spectrum Protect 8.1.0.0 through 8.1.17.0 could allow a local user to cause a denial of service due to due to improper time-of-check to time-of-use functionality. IBM X-Force ID: 256012.
nvd
CVE-2021-39048MEDIUMCVSS 5.5≥ 8.1.0.0, ≤ 8.1.12.0≥ 7.1.0.0, ≤ 7.1.8.102021-12-13
CVE-2021-39048 [MEDIUM] CWE-787 CVE-2021-39048: IBM Spectrum Protect Client 7.1 and 8.1 is vulnerable to a stack based buffer overflow, caused by im
IBM Spectrum Protect Client 7.1 and 8.1 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local attacker could exploit this vulnerability and cause a denial of service. IBM X-Force ID: 214438.
nvd
CVE-2021-29672HIGHCVSS 7.8≥ 8.1.0.0, ≤ 8.1.11.0v8.1.0.0+1 more2021-04-26
CVE-2021-29672 [HIGH] CWE-787 CVE-2021-29672: IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow,
IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing the current locale settings. A local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash. IBM X-Force ID: 199479
cvelistv5nvd
CVE-2021-20546MEDIUMCVSS 5.5≥ 8.1.0.0, ≤ 8.1.11.0v8.1.0.0+1 more2021-04-26
CVE-2021-20546 [MEDIUM] CWE-787 CVE-2021-20546: IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow,
IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and cause the application to crash. IBM X-Force ID: 198934
cvelistv5nvd
CVE-2020-4494HIGHCVSS 7.5≥ 8.1.7.0, ≤ 8.1.9.1≥ 8.1.9.0, ≤ 8.1.9.12020-06-15
CVE-2020-4494 [HIGH] CWE-287 CVE-2020-4494: IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX
IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX) and IBM Spectrum Protect for Space Management 8.1.7.0 through 8.1.9.1 (Linux), 8.1.9.0 through 8.1.9.1 (AIX) web user interfaces could allow an attacker to bypass authentication due to improper session validation which can result in access to unauthoriz
nvd
CVE-2020-4406MEDIUMCVSS 5.4≥ 8.1.7.0, ≤ 8.1.9.1≥ 8.1.9.0, ≤ 8.1.9.12020-06-15
CVE-2020-4406 [MEDIUM] CWE-1021 CVE-2020-4406: IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX
IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX) and IBM Spectrum Protect for Space Management 8.1.7.0 through 8.1.9.1 (Linux), 8.1.9.0 through 8.1.9.1 (AIX) web user interfaces could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious We
nvd
CVE-2018-1882MEDIUMCVSS 4.7v7.1v8.12019-04-08
CVE-2018-1882 [MEDIUM] CWE-312 CVE-2018-1882: In a certain atypical IBM Spectrum Protect 7.1 and 8.1 configurations, the node password could be di
In a certain atypical IBM Spectrum Protect 7.1 and 8.1 configurations, the node password could be displayed in plain text in the IBM Spectrum Protect client trace file. IBM X-Force ID: 151968.
cvelistv5nvd
CVE-2018-1447HIGHCVSS 8.1≥ 7.1.0.0, ≤ 7.1.8.1≥ 8.1.0.0, ≤ 8.1.4.0+2 more2018-04-04
CVE-2018-1447 [MEDIUM] CWE-916 CVE-2018-1447: The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.
The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Pr
cvelistv5nvd