Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security identity governance and intelligence vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2017-1367
IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 up to and including 5.2.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser ...
Ibm Security Identity Governance And Intelligence
9.8
CVSSv3
CVE-2018-1944
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryp...
Ibm Security Identity Governance And Intelligence
6.1
CVSSv3
CVE-2018-1945
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance could allow a remote malicious user to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerab...
Ibm Security Identity Governance And Intelligence
4.3
CVSSv3
CVE-2018-1949
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 153429.
Ibm Security Identity Governance And Intelligence
4.3
CVSSv3
CVE-2018-1950
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance generates an error message that includes sensitive information about its environment, users, or associated data which could be used in further attacks against the system. IBM X-For...
Ibm Security Identity Governance And Intelligence
7.5
CVSSv3
CVE-2018-1946
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but...
Ibm Security Identity Governance And Intelligence
6.1
CVSSv3
CVE-2018-1947
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading...
Ibm Security Identity Governance And Intelligence
4.3
CVSSv3
CVE-2018-1948
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this...
Ibm Security Identity Governance And Intelligence
6.5
CVSSv3
CVE-2020-4790
IBM Security Identity Governance and Intelligence 5.2.6 could allow a user to cause a denial of service due to improperly validating a supplied URL, rendering the application unusuable. IBM X-Force ID: 189375.
Ibm Security Identity Governance And Intelligence 5.2.6
2.7
CVSSv3
CVE-2020-4248
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 17...
Ibm Security Identity Governance And Intelligence 5.2.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »