Vulnerabilities > IBM > Robotic Process Automation FOR Cloud PAK > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-05 | CVE-2022-41740 | Cleartext Storage of Sensitive Information vulnerability in IBM products IBM Robotic Process Automation 20.12 through 21.0.6 could allow an attacker with physical access to the system to obtain highly sensitive information from system memory. | 4.6 |
2023-01-05 | CVE-2022-43573 | Unspecified vulnerability in IBM products IBM Robotic Process Automation 20.12 through 21.0.6 is vulnerable to exposure of the name and email for the creator/modifier of platform level objects. | 5.3 |
2022-11-03 | CVE-2022-38710 | Unspecified vulnerability in IBM products IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensitive version to an unauthorized control sphere information that could aid in further attacks against the system. | 5.3 |
2022-10-06 | CVE-2022-36774 | Unspecified vulnerability in IBM products IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 is vulnerable to man in the middle attacks through manipulation of the client proxy configuration. high complexity ibm | 5.3 |
2022-10-06 | CVE-2022-38709 | Cross-site Scripting vulnerability in IBM Robotic Process Automation for Cloud PAK IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 for Cloud Pak is vulnerable to cross-site scripting. | 6.1 |
2022-08-10 | CVE-2022-22490 | Files or Directories Accessible to External Parties vulnerability in IBM products IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. | 4.9 |
2022-06-24 | CVE-2022-22502 | Cross-site Scripting vulnerability in IBM products IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to cross-site scripting. | 5.4 |
2022-06-24 | CVE-2022-33953 | Insufficiently Protected Credentials vulnerability in IBM products IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. | 4.6 |