Vulnerabilities > IBM > Security Identity Governance AND Intelligence

DATE CVE VULNERABILITY TITLE RISK
2019-02-21 CVE-2018-1949 Information Exposure vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance discloses sensitive information to unauthorized users.
network
low complexity
ibm CWE-200
4.3
2019-02-21 CVE-2018-1948 Session Fixation vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies.
network
low complexity
ibm CWE-384
4.3
2019-02-21 CVE-2018-1947 Cross-site Scripting vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance is vulnerable to cross-site scripting.
network
low complexity
ibm CWE-79
6.1
2019-02-21 CVE-2018-1946 Inadequate Encryption Strength vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
network
low complexity
ibm CWE-326
7.5
2019-02-21 CVE-2018-1945 Improper Input Validation vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance could allow a remote attacker to hijack the clicking action of the victim.
network
low complexity
ibm CWE-20
6.1
2019-02-21 CVE-2018-1944 Use of Hard-coded Credentials vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
network
low complexity
ibm CWE-798
critical
9.8
2018-09-07 CVE-2018-1757 Missing Authentication for Critical Function vulnerability in IBM Security Identity Governance and Intelligence 5.2.3.2/5.2.4
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 could allow an attacker to obtain sensitive information due to missing authentication in IGI for the survey application.
network
low complexity
ibm CWE-306
5.3
2018-09-07 CVE-2018-1756 SQL Injection vulnerability in IBM Security Identity Governance and Intelligence 5.2.3.2/5.2.4
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 is vulnerable to SQL injection.
network
low complexity
ibm CWE-89
7.5
2018-08-06 CVE-2017-1755 Unspecified vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 could allow a local attacker to inject commands into malicious files that could be executed by the administrator.
local
low complexity
ibm
6.7
2018-08-06 CVE-2017-1412 Information Exposure vulnerability in IBM Security Identity Governance and Intelligence
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 generates an error message that includes sensitive information about its environment, users, or associated data.
network
low complexity
ibm CWE-200
4.3