IBM Security Verify Access 10.0.7.1

CPE Details

IBM Security Verify Access 10.0.7.1
10.0.7.1
2024-08-05
15h25 +00:00
2024-08-05
15h25 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:ibm:security_verify_access:10.0.7.1:*:*:*:*:*:*:*

Informations

Vendor

ibm

Product

security_verify_access

Version

10.0.7.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-45647 2025-01-20 14h50 +00:00 IBM Security Verify Access 10.0.0 through 10.0.8 and IBM Security Verify Access Docker 10.0.0 through 10.0.8 could allow could an unverified user to change the password of an expired user without prior knowledge of that password.
9.8
Critical
CVE-2024-49804 2024-11-29 16h55 +00:00 IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a locally authenticated non-administrative user to escalate their privileges due to unnecessary permissions used to perform certain tasks.
7.8
High
CVE-2024-49806 2024-11-29 16h53 +00:00 IBM Security Verify Access Appliance 10.0.0 through 10.0.8 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
9.8
Critical
CVE-2024-49805 2024-11-29 16h52 +00:00 IBM Security Verify Access Appliance 10.0.0 through 10.0.8 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
9.8
Critical
CVE-2024-49803 2024-11-29 16h50 +00:00 IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
9.8
Critical
CVE-2024-35133 2024-08-29 16h39 +00:00 IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote authenticated attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.
8.2
High
CVE-2023-30430 2024-06-27 15h53 +00:00 IBM Security Verify Access 10.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from trace logs. IBM X-Force ID: 252183.
5.5
Medium
CVE-2024-31883 2024-06-27 15h50 +00:00 IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption. IBM X-Force ID: 287615.
5.9
Medium