Vulnerabilities > IBM

DATE CVE VULNERABILITY TITLE RISK
2024-06-27 CVE-2023-38371 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-06-27 CVE-2023-42011 Improper Restriction of Rendered UI Layers or Frames vulnerability in IBM Sterling B2B Integrator 6.1/6.2
IBM Sterling B2B Integrator Standard Edition 6.1 and 6.2 does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
network
low complexity
ibm CWE-1021
5.4
2024-06-27 CVE-2023-42014 Cross-site Scripting vulnerability in IBM Sterling B2B Integrator
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.2.0.2 is vulnerable to cross-site scripting.
network
low complexity
ibm CWE-79
5.4
2024-06-27 CVE-2024-31916 Missing Authentication for Critical Function vulnerability in IBM Openbmc
IBM OpenBMC FW1050.00 through FW1050.10 BMCWeb HTTPS server component could disclose sensitive URI content to an unauthorized actor that bypasses authentication channels.
network
low complexity
ibm CWE-306
7.5
2024-06-27 CVE-2024-35153 Cross-site Scripting vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting.
network
low complexity
ibm CWE-79
4.8
2024-06-27 CVE-2023-30430 Information Exposure Through Log Files vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from trace logs.
local
low complexity
ibm CWE-532
5.5
2024-06-27 CVE-2024-31883 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption.
network
high complexity
ibm
5.9
2024-06-20 CVE-2024-37532 Improper Verification of Cryptographic Signature vulnerability in IBM Websphere Application Server 8.5.0.0/9.0.0.0
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to identity spoofing by an authenticated user due to improper signature validation.
network
low complexity
ibm CWE-347
8.8
2024-06-19 CVE-2024-38329 Incorrect Authorization vulnerability in IBM Storage Protect for Virtual Environments
IBM Storage Protect for Virtual Environments: Data Protection for VMware 8.1.0.0 through 8.1.22.0 could allow a remote authenticated attacker to bypass security restrictions, caused by improper validation of user permission.
network
low complexity
ibm CWE-863
7.7
2024-06-15 CVE-2024-27275 Improper Authentication vulnerability in IBM I
IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability caused by an insufficient authority requirement.
local
low complexity
ibm CWE-287
7.8