Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security identity governance and intelligence vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2017-1367
IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 up to and including 5.2.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser ...
Ibm Security Identity Governance And Intelligence
383
VMScore
CVE-2017-1395
IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 up to and including 5.2.3.2 could allow a remote malicious user to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnera...
Ibm Security Identity Governance And Intelligence
668
VMScore
CVE-2018-1944
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryp...
Ibm Security Identity Governance And Intelligence
516
VMScore
CVE-2018-1945
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance could allow a remote malicious user to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerab...
Ibm Security Identity Governance And Intelligence
445
VMScore
CVE-2018-1946
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but...
Ibm Security Identity Governance And Intelligence
383
VMScore
CVE-2018-1948
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this...
Ibm Security Identity Governance And Intelligence
356
VMScore
CVE-2018-1949
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 153429.
Ibm Security Identity Governance And Intelligence
356
VMScore
CVE-2018-1950
IBM Security Identity Governance and Intelligence 5.2 up to and including 5.2.4.1 Virtual Appliance generates an error message that includes sensitive information about its environment, users, or associated data which could be used in further attacks against the system. IBM X-For...
Ibm Security Identity Governance And Intelligence
445
VMScore
CVE-2020-4233
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote malicious user to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could...
Ibm Security Identity Governance And Intelligence 5.2.6
356
VMScore
CVE-2020-4231
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
Ibm Security Identity Governance And Intelligence 5.2.6
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »