Search
Search Results (12 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-40746 | 2 Ibm, Microsoft | 2 I Access Client Solutions, Windows | 2025-04-24 | 7.2 High |
IBM i Access Family 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.0 could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236581. | ||||
CVE-2015-0114 | 1 Ibm | 1 I Access For Windows | 2025-04-20 | N/A |
Stack-based buffer overflow in IBM V5R4, and IBM i Access for Windows 6.1 and 7.1. | ||||
CVE-2015-7416 | 2 Ibm, Microsoft | 2 I Access, Windows | 2025-04-12 | N/A |
AFP Workbench Viewer in IBM i Access 7.1 on Windows allows remote attackers to cause a denial of service (viewer crash) via a crafted workbench file. | ||||
CVE-2015-2023 | 2 Ibm, Microsoft | 2 I Access, Windows | 2025-04-12 | N/A |
Buffer overflow in IBM i Access 7.1 on Windows allows local users to gain privileges via unspecified vectors. | ||||
CVE-2015-7422 | 2 Ibm, Microsoft | 2 I Access, Windows | 2025-04-12 | N/A |
Buffer overflow in IBM i Access 7.1 on Windows allows local users to cause a denial of service (application crash) via unspecified vectors. | ||||
CVE-2016-0287 | 2 Ibm, Microsoft | 2 I Access, Windows | 2025-04-12 | N/A |
IBM i Access 7.1 on Windows allows local users to discover registry passwords via unspecified vectors. | ||||
CVE-2014-8920 | 1 Ibm | 1 I Access | 2025-04-12 | N/A |
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors. | ||||
CVE-2024-22318 | 1 Ibm | 1 I Access Client Solutions | 2024-11-21 | 5.1 Medium |
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091. | ||||
CVE-2023-45185 | 1 Ibm | 1 I Access Client Solutions | 2024-11-21 | 7.4 High |
IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273. | ||||
CVE-2023-45184 | 1 Ibm | 1 I Access Client Solutions | 2024-11-21 | 6.2 Medium |
IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to obtain a decryption key due to improper authority checks. IBM X-Force ID: 268270. | ||||
CVE-2023-45182 | 1 Ibm | 1 I Access Client Solutions | 2024-11-21 | 7.4 High |
IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 is vulnerable to having its key for an encrypted password decoded. By somehow gaining access to the encrypted password, a local attacker could exploit this vulnerability to obtain the password to other systems. IBM X-Force ID: 268265. | ||||
CVE-2018-1888 | 1 Ibm | 1 I Access | 2024-11-21 | N/A |
An untrusted search path vulnerability in IBM i Access for Windows versions 7.1 and earlier on Windows can allow arbitrary code execution via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function. IBM X-Force ID: 152079. |
Page 1 of 1.