Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security identity governance and intelligence vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-4958
IBM Security Identity Governance and Intelligence 5.2.6 does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. IBM X-Force ID: 192209.
Ibm Security Identity Governance And Intelligence 5.2.6
9.8
CVSSv3
CVE-2018-1944
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryp...
Ibm Security Identity Governance And Intelligence
8.8
CVSSv3
CVE-2017-1407
IBM Security Identity Manager Virtual Appliance 6.0 and 7.0 could allow a remote authenticated malicious user to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the sys...
Ibm Security Identity Governance And Intelligence 5.2.0
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Manager 6.0.0.0
Ibm Security Identity Manager 7.0.0.0
Ibm Security Privileged Identity Manager 2.0.0
Ibm Security Privileged Identity Manager 2.0.1
Ibm Security Privileged Identity Manager 2.0.2
8.6
CVSSv3
CVE-2017-1483
IBM Security Identity Manager Adapters 6.0 and 7.0 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 128621.
Ibm Security Identity Manager 6.0.0.0
Ibm Security Privileged Identity Manager 2.0.2
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Privileged Identity Manager 2.0.1
Ibm Security Privileged Identity Manager 2.0
Ibm Security Identity Manager 7.0.0.0
8.2
CVSSv3
CVE-2020-4795
IBM Security Identity Governance and Intelligence 5.2.6 could disclose sensitive information to an unauthorized user using a specially crafted HTTP request. IBM X-Force ID: 189446.
Ibm Security Identity Governance And Intelligence 5.2.6
8.1
CVSSv3
CVE-2017-1396
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
7.5
CVSSv3
CVE-2020-4232
IBM Security Identity Governance and Intelligence 5.2.6 could allow an malicious user to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.
Ibm Security Identity Governance And Intelligence 5.2.6
7.5
CVSSv3
CVE-2020-4245
IBM Security Identity Governance and Intelligence 5.2.6 does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 175423.
Ibm Security Identity Governance And Intelligence 5.2.6
7.5
CVSSv3
CVE-2018-1946
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but...
Ibm Security Identity Governance And Intelligence
7.5
CVSSv3
CVE-2018-1756
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, information in the back-end database. IBM X-Force ID: 148599.
Ibm Security Identity Governance And Intelligence 5.2.4
Ibm Security Identity Governance And Intelligence 5.2.3.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »