Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Jazz For Service Management
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-4186 1 Ibm 1 Jazz For Service Management 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
IBM Jazz for Service Management 1.1.3 is vulnerable to HTTP header injection, caused by incorrect trust in the HTTP Host header during caching. By sending a specially crafted HTTP GET request, a remote attacker could exploit this vulnerability to inject arbitrary HTTP headers, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-force ID: 158976.
CVE-2017-1631 1 Ibm 1 Jazz For Service Management 2024-02-28 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management (IBM Tivoli Components 1.1.3) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 133140.
CVE-2017-1746 1 Ibm 1 Jazz For Service Management 2024-02-28 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management (IBM Tivoli Components 1.1.3) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 135519.
CVE-2016-9975 1 Ibm 2 Dashboard Application Services Hub, Jazz For Service Management 2024-02-28 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management 1.1.2.1 and 1.1.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 1998714.
CVE-2016-5935 1 Ibm 2 Dashboard Application Services Hub, Jazz For Service Management 2024-02-28 4.3 MEDIUM 5.9 MEDIUM
IBM Jazz for Service Management could allow a remote attacker to obtain sensitive information, caused by the failure to properly validate the SSL certificate. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.