IBM Security Identity Manager 7.0.2 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 200252.
Max CVSS
7.5
EPSS Score
0.08%
Published
2021-05-20
Updated
2021-05-24
IBM Security Identity Manager 7.0.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 200102.
Max CVSS
7.5
EPSS Score
0.16%
Published
2021-05-20
Updated
2021-05-24
IBM Security Identity Manager 7.0.2 could allow an authenticated user to bypass security and perform actions that they should not have access to. IBM X-Force ID: 200015
Max CVSS
8.8
EPSS Score
0.09%
Published
2021-05-20
Updated
2022-07-12
IBM Security Identity Manager 6.0.2 could allow an authenticated malicious user to change the passwords of other users in the Windows AD environment when IBM Security Identity Manager Windows Password Synch Plug-in is deployed and configured. IBM X-Force ID: 197789.
Max CVSS
7.5
EPSS Score
0.05%
Published
2021-06-16
Updated
2022-07-12
IBM Security Identity Manager 7.0.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 171511.
Max CVSS
9.8
EPSS Score
0.12%
Published
2020-02-04
Updated
2020-02-12
IBM Security Identity Manager 6.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 166456.
Max CVSS
9.3
EPSS Score
1.24%
Published
2019-11-20
Updated
2019-11-22
IBM Security Identity Manager 6.0 and 7.0 could allow an attacker to create unexpected control flow paths through the application, potentially bypassing security checks. Exploitation of this weakness can result in a limited form of code injection. IBM X-Force ID: 156162.
Max CVSS
7.2
EPSS Score
0.04%
Published
2019-02-04
Updated
2022-12-03
IBM Security Identity Manager 6.0.0 Virtual Appliance is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 155265.
Max CVSS
7.1
EPSS Score
0.20%
Published
2019-01-18
Updated
2019-10-09
IBM Security Identity Manager 6.0.0 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 153750.
Max CVSS
9.9
EPSS Score
0.14%
Published
2019-01-14
Updated
2019-10-09
IBM Security Identity Manager 7.0.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 153633.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-01-24
Updated
2020-08-24
IBM Security Identity Manager 6.0.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 153628.
Max CVSS
7.5
EPSS Score
0.13%
Published
2019-01-14
Updated
2020-08-24
IBM Security Identity Manager Virtual Appliance 7.0 allows an authenticated attacker to upload or transfer files of dangerous types that can be automatically processed within the environment. IBM X-Force ID: 140055.
Max CVSS
8.8
EPSS Score
0.14%
Published
2018-06-08
Updated
2019-10-09
IBM Security Identity Manager Adapters 6.0 and 7.0 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 128621.
Max CVSS
8.6
EPSS Score
0.22%
Published
2017-09-28
Updated
2017-10-06
IBM Security Identity Manager Virtual Appliance 6.0 and 7.0 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 127394.
Max CVSS
9.0
EPSS Score
0.25%
Published
2017-09-28
Updated
2020-07-20
IBM Security Identity Manager Adapters 6.0 and 7.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 126801.
Max CVSS
7.8
EPSS Score
0.04%
Published
2017-09-25
Updated
2019-10-03
IBM Security Identity Manager Virtual Appliance stores user credentials in plain in clear text which can be read by a local user.
Max CVSS
7.8
EPSS Score
0.04%
Published
2017-02-01
Updated
2018-05-02
Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. IBM X-Force ID: 111736.
Max CVSS
8.8
EPSS Score
0.07%
Published
2018-01-12
Updated
2018-01-29
IBM Tivoli Identity Manager 5.1.x before 5.1.0.15-ISS-TIM-IF0057 and Security Identity Manager 6.0.x before 6.0.0.4-ISS-SIM-IF0001 and 7.0.x before 7.0.0.0-ISS-SIM-IF0003 store encrypted user credentials and the keystore password in cleartext in configuration files, which allows local users to decrypt SIM credentials via unspecified vectors. IBM X-Force ID: 96180.
Max CVSS
7.8
EPSS Score
0.04%
Published
2018-04-20
Updated
2018-05-22
Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager 5.1, 6.0, and 7.0 allows remote attackers to hijack the authentication of users for requests that can cause cross-site scripting attacks, web cache poisoning, or other unspecified impacts via unknown vectors.
Max CVSS
8.8
EPSS Score
0.10%
Published
2017-09-18
Updated
2017-09-22
19 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!