Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security guardium 10.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2020-4185
IBM Security Guardium 10.5, 10.6, and 11.1 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 174803.
Ibm Security Guardium 10.5
Ibm Security Guardium 10.6
Ibm Security Guardium 11.1
5
CVSSv2
CVE-2020-4186
IBM Security Guardium 10.5, 10.6, and 11.1 could disclose sensitive information on the login page that could aid in further attacks against the system. IBM X-Force ID: 174804.
Ibm Security Guardium 10.5
Ibm Security Guardium 10.6
Ibm Security Guardium 11.1
5
CVSSv2
CVE-2018-1501
IBM Security Guardium 10.5, 10.6, and 11.0 could allow an unauthorized user to obtain sensitive information due to missing security controls. IBM X-Force ID: 141226.
Ibm Security Guardium 10.5
Ibm Security Guardium 10.6
Ibm Security Guardium 11.0
5.8
CVSSv2
CVE-2018-1509
IBM Security Guardium EcoSystem 10.5 does not validate, or incorrectly validates, a certificate.This weakness might allow an malicious user to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a...
Ibm Security Guardium 10.5
6.5
CVSSv2
CVE-2019-4292
IBM Security Guardium 10.5 could allow a remote malicious user to upload arbitrary files, which could allow the malicious user to execute arbitrary code on the vulnerable web server. IBM X-Force ID: 160698.
Ibm Security Guardium 10.5
2.1
CVSSv2
CVE-2018-1498
IBM Security Guardium EcoSystem 10.5 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 141223.
Ibm Security Guardium 10.5
7.5
CVSSv2
CVE-2018-1818
IBM Security Guardium 10 and 10.5 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 150022.
Ibm Security Guardium
5
CVSSv2
CVE-2017-1597
IBM Security Guardium 10.0, 10.0.1, 10.1, 10.1.2, 10.1.3, 10.1.4, and 10.5 Database Activity Monitor does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 132610.
Ibm Security Guardium
2.1
CVSSv2
CVE-2017-1268
IBM Security Guardium 10 and 10.5 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 124743.
Ibm Security Guardium
5
CVSSv2
CVE-2017-1272
IBM Security Guardium 10.0 and 10.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 124747. IBM X-Force ID: 124747.
Ibm Security Guardium
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »