Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Jazz For Service Management
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-4201 1 Ibm 1 Jazz For Service Management 2023-12-10 5.8 MEDIUM 6.1 MEDIUM
IBM Jazz for Service Management 1.1.3, 1.1.3.1, and 1.1.3.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 159122.
CVE-2017-1631 1 Ibm 1 Jazz For Service Management 2023-12-10 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management (IBM Tivoli Components 1.1.3) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 133140.
CVE-2017-1746 1 Ibm 1 Jazz For Service Management 2023-12-10 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management (IBM Tivoli Components 1.1.3) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 135519.
CVE-2016-9975 1 Ibm 2 Dashboard Application Services Hub, Jazz For Service Management 2023-12-10 6.8 MEDIUM 8.8 HIGH
IBM Jazz for Service Management 1.1.2.1 and 1.1.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 1998714.
CVE-2016-5935 1 Ibm 2 Dashboard Application Services Hub, Jazz For Service Management 2023-12-10 4.3 MEDIUM 5.9 MEDIUM
IBM Jazz for Service Management could allow a remote attacker to obtain sensitive information, caused by the failure to properly validate the SSL certificate. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.