IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm security verify access 10.0.0 |
||
ibm security verify access 10.0.1 |
||
ibm security verify access 10.0.2 |
||
ibm security verify access 10.0.3 |