Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm security identity governance and intelligence 5.2 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-1944
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryp...
Ibm Security Identity Governance And Intelligence
8.6
CVSSv3
CVE-2017-1483
IBM Security Identity Manager Adapters 6.0 and 7.0 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 128621.
Ibm Security Privileged Identity Manager 2.0.2
Ibm Security Identity Manager 6.0.0.0
Ibm Security Privileged Identity Manager 2.0.1
Ibm Security Identity Manager 7.0.0.0
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Privileged Identity Manager 2.0
8.1
CVSSv3
CVE-2017-1396
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
7.5
CVSSv3
CVE-2018-1946
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but...
Ibm Security Identity Governance And Intelligence
7.5
CVSSv3
CVE-2017-1366
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 126859.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
7.5
CVSSv3
CVE-2017-1411
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for malicious users to compromise user accounts. IBM X-Force ID: 127399.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
6.7
CVSSv3
CVE-2017-1755
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 could allow a local malicious user to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
6.5
CVSSv3
CVE-2017-1368
IBM Security Identity Governance Virtual Appliance 5.2 up to and including 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site t...
Ibm Security Identity Governance And Intelligence 5.2
Ibm Security Identity Governance And Intelligence 5.2.1
Ibm Security Identity Governance And Intelligence 5.2.3.2
Ibm Security Identity Governance And Intelligence 5.2.2
Ibm Security Identity Governance And Intelligence 5.2.2.1
Ibm Security Identity Governance And Intelligence 5.2.3
Ibm Security Identity Governance And Intelligence 5.2.3.1
6.1
CVSSv3
CVE-2018-1947
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading...
Ibm Security Identity Governance And Intelligence
6.1
CVSSv3
CVE-2018-1945
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance could allow a remote malicious user to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerab...
Ibm Security Identity Governance And Intelligence
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »