Vulnerabilities > IBM > Security Verify Access > Medium

DATE CVE VULNERABILITY TITLE RISK
2022-02-02 CVE-2021-39070 Unspecified vulnerability in IBM products
IBM Security Verify Access 10.0.0.0, 10.0.1.0 and 10.0.2.0 with the advanced access control authentication service enabled could allow an attacker to authenticate as any user on the system.
network
ibm
6.8
2022-01-10 CVE-2021-38894 Information Exposure Through an Error Message vulnerability in IBM Security Verify Access 10.0.0/10.0.1.0/10.0.2.0
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser.
network
low complexity
ibm CWE-209
4.0
2022-01-10 CVE-2021-38921 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Verify Access 10.0.0/10.0.1.0/10.0.2.0
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2022-01-10 CVE-2021-38956 Information Exposure vulnerability in IBM Security Verify Access 10.0.0/10.0.1.0/10.0.2.0
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive version information in HTTP response headers that could aid in further attacks against the system.
network
low complexity
ibm CWE-200
5.0
2022-01-10 CVE-2021-38957 Improper Input Validation vulnerability in IBM Security Verify Access 10.0.0/10.0.1.0/10.0.2.0
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive information due to hazardous input validation during QR code generation.
network
low complexity
ibm CWE-20
5.0
2021-07-15 CVE-2021-20496 Improper Input Validation vulnerability in IBM Security Verify Access 10.0.0
IBM Security Verify Access Docker 10.0.0 could allow an authenticated user to bypass input due to improper input validation.
network
low complexity
ibm CWE-20
4.0
2021-07-15 CVE-2021-20497 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Verify Access 10.0.0
IBM Security Verify Access Docker 10.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2021-07-15 CVE-2021-20498 Information Exposure vulnerability in IBM Security Verify Access 10.0.0
IBM Security Verify Access Docker 10.0.0 reveals version information in HTTP requests that could be used in further attacks against the system.
network
low complexity
ibm CWE-200
5.0
2021-07-15 CVE-2021-20499 Information Exposure Through an Error Message vulnerability in IBM Security Verify Access 10.0.0
IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser.
network
low complexity
ibm CWE-209
4.0
2021-07-15 CVE-2021-20511 Path Traversal vulnerability in IBM Security Verify Access 10.0.0
IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to traverse directories on the system.
network
low complexity
ibm CWE-22
6.8