Vulnerabilities > IBM > Cloud PAK FOR Security > 1.3.0.1

DATE CVE VULNERABILITY TITLE RISK
2021-01-27 CVE-2020-4967 Information Exposure vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security (CP4S) 1.3.0.1 could disclose sensitive information through HTTP headers which could be used in further attacks against the system.
network
low complexity
ibm CWE-200
4.0
2021-01-27 CVE-2020-4628 Information Exposure Through an Error Message vulnerability in IBM Cloud PAK for Security 1.3.0.1/1.4.0.0
IBM Cloud Pak for Security (CP4S) 1.3.0.1 and 1.4.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser.
network
low complexity
ibm CWE-209
5.0
2020-11-30 CVE-2020-4696 Insufficient Session Expiration vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security 1.3.0.1(CP4S) does not invalidate session after logout which could allow an authenticated user to obtain sensitive information from the previous session.
network
low complexity
ibm CWE-613
4.3
2020-11-30 CVE-2020-4627 Injection vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security 1.3.0.1(CP4S) potentially vulnerable to CVS Injection.
network
low complexity
ibm CWE-74
critical
9.0
2020-11-30 CVE-2020-4626 Information Exposure vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security 1.3.0.1 (CP4S) could reveal sensitive information about the internal network to an authenticated user using a specially crafted HTTP request.
network
low complexity
ibm CWE-200
4.0
2020-11-30 CVE-2020-4625 Information Exposure vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security 1.3.0.1(CP4S) could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag.
network
low complexity
ibm CWE-200
5.0
2020-11-30 CVE-2020-4624 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud PAK for Security 1.3.0.1
IBM Cloud Pak for Security 1.3.0.1 (CP4S) uses weaker than expected cryptographic algorithms during negotiation could allow an attacker to decrypt sensitive information.
network
low complexity
ibm CWE-327
5.0