Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2015-5045
Disclosure Date: March 26, 2018 (last updated November 26, 2024)
The Administration and Reporting tool in IBM Rational License Key Server (RLKS) before 8.1.4.9 iFix 04 allows local users to obtain sensitive information via unspecified vectors. IBM X-Force ID: 106938.
0
Attacker Value
Unknown
CVE-2015-1907
Disclosure Date: May 08, 2015 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4 before 8.1.4.7 allows remote authenticated users to read cookies via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-3079
Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 allows remote authenticated users to bypass authorization checks and visit unspecified URLs with license-usage data via a DESCRIBE clause in a SPARQL query.
0
Attacker Value
Unknown
CVE-2014-4756
Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 allows remote authenticated users to hijack sessions via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-0909
Disclosure Date: September 10, 2014 (last updated October 05, 2023)
The Administration and Reporting Tool in IBM Rational License Key Server (RLKS) 8.1.4.x before 8.1.4.4 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
0
Attacker Value
Unknown
CVE-2011-1389
Disclosure Date: January 19, 2012 (last updated October 04, 2023)
Multiple directory traversal vulnerabilities in the vendor daemon in Rational Common Licensing in Telelogic License Server 2.0, Rational License Server 7.x, and ibmratl in IBM Rational License Key Server (RLKS) 8.0 through 8.1.2 allow remote attackers to execute arbitrary code via vectors related to save, rename, and load operations on log files. NOTE: this might overlap CVE-2011-4135.
0