Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Cloud Orchestrator
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-4394 1 Ibm 1 Cloud Orchestrator 2021-07-21 2.1 LOW 2.3 LOW
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 contain APIs that could be used by a local user to send email. IBM X-Force ID: 162232.
CVE-2019-4398 1 Ibm 2 Cloud Orchestrator, Cloud Orchestrator Enterprise 2021-07-21 2.1 LOW 3.3 LOW
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 could allow a local user to obtain sensitive information from SessionManagement cookies. IBM X-Force ID: 162259.
CVE-2019-4395 1 Ibm 1 Cloud Orchestrator 2020-08-24 2.1 LOW 3.3 LOW
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a local user to obtain sensitive information from temporary script files. IBM X-Force ID: 162333.
CVE-2016-0205 1 Ibm 1 Cloud Orchestrator 2019-10-09 2.1 LOW 3.3 LOW
A vulnerability has been identified in IBM Cloud Orchestrator 2.3, 2.3.0.1, 2.4, and 2.4.0.1 that could allow an attacker after authentication to enumerate valid users of the system. IBM X-Force ID: 109394.
CVE-2016-0206 1 Ibm 1 Cloud Orchestrator 2017-02-15 2.1 LOW 3.3 LOW
IBM Cloud Orchestrator could allow a local authenticated attacker to cause the server to slow down for a short period of time by using a specially crafted and malformed URL.
CVE-2016-0202 1 Ibm 1 Cloud Orchestrator 2017-02-15 2.1 LOW 3.3 LOW
A vulnerability has been identified in tasks, backend object generated for handling any action performed by the application in IBM Cloud Orchestrator. It is possible for an authenticated user to view any task of the current users domain.
CVE-2015-7494 1 Ibm 2 Cloud Orchestrator, Smartcloud Orchestrator 2017-02-14 1.7 LOW 2.8 LOW
A vulnerability has been identified in IBM Cloud Orchestrator services/[action]/launch API. An authenticated domain admin user might modify cross domain resources via a /services/[action]/launch API call, provided it would have been possible for the domain admin user to gain access to a resource identifier of the other domain.