Описание
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Ссылки
- VDB EntryVendor Advisory
- PatchVendor Advisory
- VDB EntryVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.3:*:*:*:*:*:*:*
EPSS
Процентиль: 39%
0.00172
Низкий
4.8 Medium
CVSS3
6.5 Medium
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 6.5
github
почти 4 года назад
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
EPSS
Процентиль: 39%
0.00172
Низкий
4.8 Medium
CVSS3
6.5 Medium
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-20