Vulnerabilities > IBM > Security Appscan > 8.5.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-02-02 | CVE-2014-8918 | Cryptographic Issues vulnerability in IBM Security Appscan IBM Security AppScan Standard 8.x and 9.x before 9.0.1.1 FP1 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 5.8 |
2015-02-02 | CVE-2014-6136 | Cryptographic Issues vulnerability in IBM Security Appscan IBM Security AppScan Standard 8.x and 9.x before 9.0.1.1 FP1 supports unencrypted sessions, which allows remote attackers to obtain sensitive information by sniffing the network. | 5.0 |
2014-08-29 | CVE-2014-4806 | Insufficiently Protected Credentials vulnerability in IBM Security Appscan The installation process in IBM Security AppScan Enterprise 8.x before 8.6.0.2 iFix 003, 8.7.x before 8.7.0.1 iFix 003, 8.8.x before 8.8.0.1 iFix 002, and 9.0.x before 9.0.0.1 iFix 001 on Linux places a cleartext password in a temporary file, which allows local users to obtain sensitive information by reading this file. | 2.1 |
2013-11-13 | CVE-2013-5453 | Information Exposure vulnerability in IBM Security Appscan IBM Security AppScan Enterprise 5.6 through 8.7.0.1 allows remote authenticated users to read arbitrary report files by leveraging knowledge of filenames that cannot be easily predicted. | 3.5 |
2013-11-13 | CVE-2013-5450 | Credentials Management vulnerability in IBM Security Appscan IBM Security AppScan Enterprise 8.5 through 8.7.0.1, when Jazz authentication is enabled, allows man-in-the-middle attackers to obtain sensitive information or modify data by leveraging an improperly protected URL to obtain a session token. | 4.0 |
2013-10-28 | CVE-2013-5430 | Credentials Management vulnerability in IBM Security Appscan The Jazz Team Server component in IBM Security AppScan Enterprise 8.x before 8.8 has a default username and password, which makes it easier for remote authenticated users to obtain unspecified access to this component by leveraging this credential information in an environment with applicable component installation details. | 5.5 |
2013-10-25 | CVE-2013-3989 | Cryptographic Issues vulnerability in IBM Security Appscan IBM Security AppScan Enterprise 8.x before 8.8 sends a cleartext AppScan Source database password in a response, which allows remote authenticated users to obtain sensitive information, and subsequently conduct man-in-the-middle attacks, by examining the response content. | 3.5 |
2013-09-08 | CVE-2013-2997 | Permissions, Privileges, and Access Controls vulnerability in IBM Security Appscan IBM Security AppScan Enterprise before 8.7 does not invalidate the session context upon a logout action, which allows remote attackers to hijack sessions by leveraging an unattended workstation. | 1.7 |
2013-09-08 | CVE-2013-0531 | Cryptographic Issues vulnerability in IBM Security Appscan The SSL implementation in IBM Security AppScan Enterprise before 8.7.0.1 enables cipher suites with weak encryption algorithms, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. | 5.0 |
2013-03-29 | CVE-2013-0532 | Cross-Site Request Forgery (CSRF) vulnerability in IBM Rational Policy Tester and Security Appscan Cross-site request forgery (CSRF) vulnerability in IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 allows remote attackers to hijack the authentication of arbitrary users for requests that cause a denial of service via malformed HTTP data. | 6.8 |