Interview with IBM Greater China Mobile Internet, information security, IBM Global Technical Director, IoT technology general manager Lin yuzhen
Lin yuzhen, general manager of IBM Greater China Mobile Internet, information security, IoT technology,
Release date:Updated on:
Affected Systems:IBM Lotus Protector for Mail SecurityDescription:--------------------------------------------------------------------------------Bugtraq id: 54486Cve id: CVE-2012-2955
IBM Lotus Protector for Mail Security software devices extend data protection and compliance to your entire social business platform. It is a complete collaborative
Vulnerability title: ibm aix Security Bypass Vulnerability
Moderate hazard level
Whether or not to publish for the first time
Release date: 1.01.06.11
Cause of vulnerability access verification error
Other threats caused by Vulnerabilities
Affected Product Version
Ibm aix 5300-12
Ibm aix 5300-11
Release date:Updated on:
Affected Systems:IBM DB2 9.xDescription:--------------------------------------------------------------------------------IBM DB2 is a large-scale commercial relational database system for e-commerce, commercial information, content management, customer relationship management, and other applications, it can run on AIX, HP-UX, Linux, Solaris, Windows, and other systems.
Multiple security
Release date:Updated on:
Affected Systems:IBM Tivoli Identity Manager 6.xIBM Tivoli Federated Identity Manager Business Gateway 6.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2010-4476
Tivoli Federated Identity Manager is a new member of the Tivoli security family. It is known for its cross-enterprise federal Identity management and is part of the IBM
IBM Lotus Sametime configures a small service program to verify Security Vulnerabilities
Release date: 2011-10-31Updated on: 2011-10-31
Affected Systems:IBM Lotus Sametime 8.xIBM Lotus Sametime 7.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-1370
IBM Sametime instant messaging software provides an
IBM WebSphere Application Server administrator access Security Bypass Vulnerability
Release date:Updated on: 2012-09-03
Affected Systems:IBM Websphere Application Server 8.0.0.4IBM Websphere Application Server 8.0 2IBM Websphere Application Server 7.0.0.23IBM Websphere Application Server 7.0 21IBM Websphere Application Server 6.1.0.43Description:--------------------------------------------------------------
Environmental preparedness
A running IBM smartcloud Entry system
Eclipse 3.6 or later
The security mechanism of Web Service based on Restlet
Before you start
Before you start, make a basic interpretation of some of the nouns that will be used in this article.
Restlet: Born in 2005, is an open source project for Java language developers. Restlet is designed to provide developers with a way to implement
Release date:Updated on:
Affected Systems:IBM WebSphere MQ 7.xDescription:--------------------------------------------------------------------------------Bugtraq id: 54983Cve id: CVE-2012-3294, CVE-2012-2206
IBM WebSphere MQ is used to provide message transmission services in enterprises.
IBM WebSphere MQ has two security vulnerabilities that can be exploited by
IBM Systems Director Security Vulnerability (CVE-2014-3099)
Release date: 2014-3 3Updated on: 2014-6 6
Affected Systems:IBM Systems Director 6.3.5.0IBM Systems Director 6.3.3.1IBM Systems Director 6.3.3.0IBM Systems Director 6.3.2.2IBM Systems Director 6.3.2.1IBM Systems Director 6.3.2.0IBM Systems Director 6.3.1.1IBM Systems Director 6.3.1.0IBM Systems Director 6.3.0.0Description:Bugtraq id: 71426CVE (CA
Release date:Updated on:
Affected Systems:IBM Platform Symphony 6.1.0IBM Platform Symphony 5.2Description:--------------------------------------------------------------------------------Bugtraq id: 65065CVE (CAN) ID: CVE-2013-6305
IBM Lotus Symphony is a free office software released by IBM.
IBM Platform Symphony 5.2 and 6.1.0.1 use the same credential encrypt
Release date:Updated on:
Affected Systems:IBM Websphere Application Server 7.xIBM Websphere Application Server 6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 67601CVE (CAN) ID: CVE-2014-0878The IBM Java SDK is a Java implementation applicable to the ibm aix platform and Linux platform.
The IBM Java SDK
imicon. jsp and "reportType" parameter is not correctly verified, it is returned to the user.
4) if the input to the ui/and maximo. jsp through the "uisesionid" parameter is not correctly verified, it is returned to the user.
5) some inputs in Start Center Layout and Configuration are returned to the user if they are not correctly verified.
6) applications allow users to perform certain operations through HTTP requests without verifying the requests.
7) handle errors in multiple UI sessions in
Release date:Updated on: 2012-08-02
Affected Systems:IBM Rational Directory ServerDescription:--------------------------------------------------------------------------------Bugtraq id: 54743Cve id: CVE-2012-2191
IBM Rational Directory Server is a solution that provides compatible Rational Tools with centralized and common infrastructure services or user verification, user management, Group definition, user data storage, and application data storage
Release date:Updated on:
Affected Systems:IBM Rational Build Forge 7.xDescription:--------------------------------------------------------------------------------IBM Rational Build Forge is an automated process execution software that helps customers Build, test, and release automated software. It is also a continuous Integration Server.
IBM Rational Build Forge has a vulnerability in
Release date:Updated on:
Affected Systems:IBM Tivoli Directory Server 6.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2010-4476
IBM Tivoli Directory Server is an enterprise identity management software.
IBM Tivoli Directory Server has multiple implementation vulnerabilities that can be exploited by malicious users to expose sensitive information
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.