Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security identity governance and intelligence 5.2.3.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-1756
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, information in the back-end database. IBM X-Force ID: 148599.
Ibm Security Identity Governance And Intelligence 5.2.4
Ibm Security Identity Governance And Intelligence 5.2.3.2
1 EDB exploit
5
CVSSv2
CVE-2018-1757
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 could allow an malicious user to obtain sensitive information due to missing authentication in IGI for the survey application. IBM X-Force ID: 148601.
Ibm Security Identity Governance And Intelligence 5.2.4
Ibm Security Identity Governance And Intelligence 5.2.3.2
5.5
CVSSv2
CVE-2017-1396
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
5
CVSSv2
CVE-2017-1409
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.1
4.3
CVSSv2
CVE-2017-1368
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site t...
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
5
CVSSv2
CVE-2017-1411
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 127399.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.2
4
CVSSv2
CVE-2017-1412
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 127400.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2
4.6
CVSSv2
CVE-2017-1755
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 could allow a local malicious user to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
5
CVSSv2
CVE-2017-1366
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 126859.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started