Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security identity governance and intelligence 5.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2018-1944
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryp...
Ibm Security Identity Governance And Intelligence
7.5
CVSSv2
CVE-2017-1483
IBM Security Identity Manager Adapters 6.0 and 7.0 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 128621.
Ibm Security Identity Manager 6.0.0.0
Ibm Security Privileged Identity Manager 2.0.2
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Privileged Identity Manager 2.0.1
Ibm Security Privileged Identity Manager 2.0
Ibm Security Identity Manager 7.0.0.0
5.8
CVSSv2
CVE-2018-1945
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance could allow a remote malicious user to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerab...
Ibm Security Identity Governance And Intelligence
5.5
CVSSv2
CVE-2017-1396
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
5
CVSSv2
CVE-2018-1946
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but...
Ibm Security Identity Governance And Intelligence
5
CVSSv2
CVE-2017-1409
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.1
5
CVSSv2
CVE-2017-1411
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 127399.
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.3.2
5
CVSSv2
CVE-2017-1366
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 126859.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.2
4.6
CVSSv2
CVE-2017-1755
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 could allow a local malicious user to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.1
4.3
CVSSv2
CVE-2018-1948
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this...
Ibm Security Identity Governance And Intelligence
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »