Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Security Verify Access
Total 57 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-32759 1 Ibm 3 Security Directory Integrator, Security Directory Server, Security Verify Access 2024-11-21 N/A 5.3 MEDIUM
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 uses insufficient session expiration which could allow an unauthorized user to obtain sensitive information. IBM X-Force ID: 228565.
CVE-2022-22465 1 Ibm 1 Security Verify Access 2024-11-21 4.6 MEDIUM 7.8 HIGH
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 could allow a local user to obtain elevated privileges due to improper access permissions. IBM X-Force ID: 225082.
CVE-2022-22464 1 Ibm 1 Security Verify Access 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225081.
CVE-2022-22463 1 Ibm 1 Security Verify Access 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 225079.
CVE-2022-22370 1 Ibm 1 Security Verify Access 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM Security Verify Access 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 221194.
CVE-2022-22311 1 Ibm 1 Security Verify Access 2024-11-21 5.8 MEDIUM 6.5 MEDIUM
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
CVE-2021-39070 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
IBM Security Verify Access 10.0.0.0, 10.0.1.0 and 10.0.2.0 with the advanced access control authentication service enabled could allow an attacker to authenticate as any user on the system. IBM X-Force ID: 215353.
CVE-2021-38957 1 Ibm 1 Security Verify Access 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive information due to hazardous input validation during QR code generation. IBM X-Force ID: 212040.
CVE-2021-38956 1 Ibm 1 Security Verify Access 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive version information in HTTP response headers that could aid in further attacks against the system. IBM X-Force ID: 212038
CVE-2021-38921 1 Ibm 1 Security Verify Access 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210067.
CVE-2021-38895 1 Ibm 1 Security Verify Access 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209563.
CVE-2021-38894 1 Ibm 1 Security Verify Access 2024-11-21 4.0 MEDIUM 2.7 LOW
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 209515.
CVE-2021-29742 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 5.2 MEDIUM 8.0 HIGH
IBM Security Verify Access Docker 10.0.0 could allow a user to impersonate another user on the system. IBM X-Force ID: 201483.
CVE-2021-29699 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 6.0 MEDIUM 6.8 MEDIUM
IBM Security Verify Access Docker 10.0.0 could allow a remote priviled user to upload arbitrary files with a dangerous file type that could be excuted by an user. IBM X-Force ID: 200600.
CVE-2021-29665 1 Ibm 1 Security Verify Access 2024-11-21 4.6 MEDIUM 7.8 HIGH
IBM Security Verify Access 20.07 is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with elevated privileges.
CVE-2021-20585 1 Ibm 1 Security Verify Access 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Security Verify Access 20.07 could disclose sensitive information in HTTP server headers that could be used in further attacks against the system. IBM X-Force ID: 199398.
CVE-2021-20576 1 Ibm 2 Application Gateway, Security Verify Access 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Verify Access 20.07 could allow a remote attacker to send a specially crafted HTTP GET request that could cause the application to crash.
CVE-2021-20575 1 Ibm 2 Application Gateway, Security Verify Access 2024-11-21 2.1 LOW 3.3 LOW
IBM Security Verify Access 20.07 allows web pages to be stored locally which can be read by another user on the system. X-Force ID: 199278.
CVE-2021-20537 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
IBM Security Verify Access Docker 10.0.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID:198918
CVE-2021-20534 2 Docker, Ibm 2 Docker, Security Verify Access 2024-11-21 4.9 MEDIUM 3.5 LOW
IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 198814