Release date: 2011-12-22Updated on: 2011-12-26
Affected Systems:IBM Lotus Domino 8.xUnaffected system:IBM Lotus Domino 8.5.3IBM Lotus Domino 8.5.2 FP4Description:--------------------------------------------------------------------------------Bugtraq id: 51167Cve id: CVE-2011-1393
IBM Lotus Domino is an email and cluster platform that integrates email, document database, Rapid Application Development Technology, and Web technology.
Release date:Updated on:
Affected Systems:IBM Tivoli Monitoring 6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 56809CVE (CAN) ID: CVE-2012-3297
IBM Tivoli Monitoring is a system Monitoring software that manages operating systems, databases, and servers in distributed and host environments.
IBM Tivoli Monitoring 6.2.2 and 6.2.3 do not properly filte
Affected Systems:
IBM Lotus Domino 7.0
Unaffected system:
IBM Lotus Domino 7.0.2 FP2
Describe:
The Lotus domino/notes server is a web-based application architecture that runs under the platform of Linux/unix and Microsoft Windows operating systems.
There is a vulnerability in Lotus Domino's proxy signature verification where a local attacker could exploit this vulnerability to elevate his or her privi
Brief introduction
In most companies, system administrators are required to do more with fewer resources. With virtualization technologies such as IBM PowerVM, the number of IBM AIX instances that system administrators must manage has grown significantly. PowerVM supports running dozens of or even hundreds of IBM AIX logical Partitions (LPARs) on a single hardwa
Transferred from: http://www.nxadmin.com/tools/675.htmlThis article will detail the details of the AppScan feature options settings, suitable for e-general, first contact AppScan children's shoes reference reading.Appscan is one of the most widely used tools on the Web application penetration Test stage. It is a desktop application that helps professional security personnel perform Web application Automation vulnerability assessments. This article foc
half an hour.The two interviewers and Miss Huang said, let me wait for a minute outside the door. It took a few minutes before I went in.When I entered the door, put down the bag and shook hands, I found every interviewer had an IBM notebook on the wall. They were looking at my resume on hand, which was probably printed on ChinaHR. I took out a copy of my document and two resumes and handed them to the two interviewers. Because they already have my r
Ning Dejun, Senior technical specialist, IBM Rational
Introduction: This article will give readers an overview of the powerful features and ease of use of IBM Rational functional Tester, and how to help testers easily complete automated functional testing.
Release date: May 01, 2005Level: PrimaryAccess Status: 1669 viewsComments: 0 (View | Add Comment-login) average score (0 ratings)Score for this article
IBM DB2 9 ("Viper"), a database product just released in Beijing, is a "hybrid" database that stores both relational and hierarchical data, which is considered IBM for business information and data processing, especially for Internet environments. The 40 database development has epoch-making significance in the history of the product.
IBM's main competitor, Oracle, a veteran database maker, does not think
Overview
Programmers often refer to DB2 for I database directory data to access data related to their DB2 objects. The DB2 database directory makes it easier and better for programmers to understand databases. The database directory provides answers to database-related questions, such as how many columns in a database use a particular data type, how many columns in the database are "Card_number" as column names, or how many unique key values exist in the index.
New System catalog view
The Wall Street Journal reported on September March 18 that IBM was about to acquire sun for $6.5 billion. Although the news was unconfirmed, it has caused an uproar. According to business joural, sun's shares rose 68% on Tuesday, from $4.97 to $8.36, but IBM's share price fell by 4% to $89.46.
Online bloggers are posting comments.Article. This blog post shows that IBM and sun both prefer open source (Lin
Release date:Updated on:
Affected Systems:Ibm aix 7.xIbm aix 6.xIbm aix 5.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2012-0194
AIX is an open standard UNIX operating system that provides you with an enterprise information technology infrastructure.
Ibm aix has a security vulnerability in implementation. When the "TCP large send offload" option
Overview
IBM Connections Desktop Plug-ins for Microsoft Windows is a desktop plug-in that provides a more convenient and faster use of IBM connections Files. Using the IBM connections Desktop plug-ins for Microsoft Windows plug-in allows you to view and manage files on multiple servers directly on the user's desktop, without using a browser, which is favored by
Release date:Updated on:
Affected Systems:IBM InfoSphere Master Data Management 11.xIBM InfoSphere Master Data Management 10.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-5426
IBM InfoSphere Master Data Management is a primary Data Management solution.
An error occurs when IBM InfoSphere Master Data Management processes sessions. Attac
Release date:Updated on: 2012-04-17
Affected Systems:IBM Cognos TM1 9.5.2IBM Cognos TM1 9.5.1IBM Cognos TM1 9.4.1Description:--------------------------------------------------------------------------------Bugtraq id: 52847
IBM Cognos TM1 provides complete enterprise planning software for dynamic planning and analysis environments, delivering timely and reliable forecasts and plans.
IBM Cognos TM1 has a r
Release date:Updated on:
Affected Systems:IBM Lotus quick R 8.2Description:--------------------------------------------------------------------------------Bugtraq id: 53678Cve id: CVE-2012-2176
IBM Lotus Quickr is a team collaboration software that helps access people, information, and project materials needed to complete tasks.
IBM Lotus Quickr for Domino 8.2 has a remote stack buffer overflow vulnerabi
Release date:Updated on:
Affected Systems:IBM solidDB 6.5.0.8 0Unaffected system:IBM solidDB 6.5.0.8 Interim Fix 5 0Description:--------------------------------------------------------------------------------Bugtraq id: 51629
IBM solidDB is a data transmission tool.
The server denial of service vulnerability exists when IBM solidDB sends SELECT statements with rownum conditions for subqueries. Attackers
IBM WebSphere mq fdc handles DoS Vulnerabilities
Release date:Updated on:
Affected Systems:IBM WebSphere message 7.0Unaffected system:IBM WebSphere MQ 7.0.1.5Description:--------------------------------------------------------------------------------Bugtraq id: 44913Cve id: CVE-2010-2638
IBM WebSphere MQ is used to provide message transmission services in enterprises.
WebSphere MQ may have loops when pr
Release date:Updated on:
Affected Systems:IBM DB2 Administration Server 9.xDescription:--------------------------------------------------------------------------------Bugtraq id: 46052
IBM DB2 is a large-scale commercial relational database system for e-commerce, commercial information, content management, customer relationship management, and other applications, it can run on AIX, HP-UX, Linux, Solaris, Windows, and other systems.
The
Ibm aix Temporary File Creation Vulnerability
Release date:Updated on:
Affected Systems:Ibm aix 7.1Ibm aix 6.1Ibm aix 5.3Description:--------------------------------------------------------------------------------Bugtraq id: 54122Cve id: CVE-2012-2179
AIX is an open standard UNIX operating system that provides you with an enterprise information technology infrastructure.
Libodm. a in ibm aix 5.3, 6.1, a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.