IBM Financial Transaction Manager 2.0.0.1

CPE Details

IBM Financial Transaction Manager 2.0.0.1
2.0.0.1
2014-02-03
15h49 +00:00
2014-02-03
15h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:ibm:financial_transaction_manager:2.0.0.1:*:*:*:*:*:*:*

Informations

Vendor

ibm

Product

financial_transaction_manager

Version

2.0.0.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2014-8917 2015-01-28 21h00 +00:00 Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media Analytics 1.3 before IF11 and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
4.3
CVE-2014-0830 2014-02-01 14h00 +00:00 Directory traversal vulnerability in the table-export implementation in the OAC component in IBM Financial Transaction Manager (FTM) 2.0 before 2.0.0.3 and 2.1 before 2.1.0.1 allows remote authenticated users to read arbitrary files via a modified pathname.
4
CVE-2014-0831 2014-02-01 14h00 +00:00 Cross-site request forgery (CSRF) vulnerability in the OAC component in IBM Financial Transaction Manager (FTM) 2.0 before 2.0.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that modify configuration data.
6.8
CVE-2014-0832 2014-02-01 14h00 +00:00 Multiple cross-site scripting (XSS) vulnerabilities in configuration-details screens in the OAC component in IBM Financial Transaction Manager (FTM) 2.0 before 2.0.0.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted text value.
3.5
CVE-2014-0833 2014-02-01 14h00 +00:00 The OAC component in IBM Financial Transaction Manager (FTM) 2.0 before 2.0.0.3 does not properly enforce operator-intervention requirements, which allows remote authenticated users to bypass intended access restrictions via an unspecified process step.
5.5