Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2015-5045

Disclosure Date: March 26, 2018 (last updated November 26, 2024)
The Administration and Reporting tool in IBM Rational License Key Server (RLKS) before 8.1.4.9 iFix 04 allows local users to obtain sensitive information via unspecified vectors. IBM X-Force ID: 106938.
0
Attacker Value
Unknown

CVE-2015-1907

Disclosure Date: May 08, 2015 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4 before 8.1.4.7 allows remote authenticated users to read cookies via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-3079

Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 allows remote authenticated users to bypass authorization checks and visit unspecified URLs with license-usage data via a DESCRIBE clause in a SPARQL query.
0
Attacker Value
Unknown

CVE-2014-4756

Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 allows remote authenticated users to hijack sessions via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-0909

Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
0
Attacker Value
Unknown

CVE-2011-1389

Disclosure Date: January 19, 2012 (last updated October 04, 2023)
Multiple directory traversal vulnerabilities in the vendor daemon in Rational Common Licensing in Telelogic License Server 2.0, Rational License Server 7.x, and ibmratl in IBM Rational License Key Server (RLKS) 8.0 through 8.1.2 allow remote attackers to execute arbitrary code via vectors related to save, rename, and load operations on log files. NOTE: this might overlap CVE-2011-4135.
0