Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security identity governance and intelligence 5.2.3.2 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2018-1756
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, information in the back-end database. IBM X-Force ID: 148599.
Ibm Security Identity Governance And Intelligence 5.2.4
Ibm Security Identity Governance And Intelligence 5.2.3.2
1 EDB exploit
445
VMScore
CVE-2018-1757
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 could allow an malicious user to obtain sensitive information due to missing authentication in IGI for the survey application. IBM X-Force ID: 148601.
Ibm Security Identity Governance And Intelligence 5.2.4
Ibm Security Identity Governance And Intelligence 5.2.3.2
445
VMScore
CVE-2017-1366
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 126859.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
383
VMScore
CVE-2017-1368
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site t...
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
445
VMScore
CVE-2017-1409
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.1
490
VMScore
CVE-2017-1396
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
445
VMScore
CVE-2017-1411
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 127399.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.2
356
VMScore
CVE-2017-1412
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 127400.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2
409
VMScore
CVE-2017-1755
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 could allow a local malicious user to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started