IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote attackers to bypass intended access restrictions via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Maximo_asset_management | Ibm | 7.1 (including) | 7.1 (including) |
Maximo_asset_management | Ibm | 7.1.1 (including) | 7.1.1 (including) |
Maximo_asset_management | Ibm | 7.1.1.1 (including) | 7.1.1.1 (including) |
Maximo_asset_management | Ibm | 7.1.1.2 (including) | 7.1.1.2 (including) |
Maximo_asset_management | Ibm | 7.1.1.5 (including) | 7.1.1.5 (including) |
Maximo_asset_management | Ibm | 7.1.1.6 (including) | 7.1.1.6 (including) |
Maximo_asset_management | Ibm | 7.1.1.7 (including) | 7.1.1.7 (including) |
Maximo_asset_management | Ibm | 7.1.1.8 (including) | 7.1.1.8 (including) |
Maximo_asset_management | Ibm | 7.1.1.9 (including) | 7.1.1.9 (including) |
Maximo_asset_management | Ibm | 7.1.1.10 (including) | 7.1.1.10 (including) |
Maximo_asset_management | Ibm | 7.1.1.11 (including) | 7.1.1.11 (including) |