Page 138 of 14922 results (0.010 seconds)

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

IBM Security Guardium Key Lifecycle Manager 4.3 could allow an authenticated user to upload files of a dangerous file type. IBM X-Force ID: 271341. IBM Security Guardium Key Lifecycle Manager 4.3 podría permitir que un usuario autenticado cargue archivos de un tipo de archivo peligroso. ID de IBM X-Force: 271341. • https://exchange.xforce.ibmcloud.com/vulnerabilities/271341 https://www.ibm.com/support/pages/node/7091157 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

IBM Security Guardium Key Lifecycle Manager 4.3 could allow an authenticated user to manipulate username data due to improper input validation. IBM X-Force ID: 271228. IBM Security Guardium Key Lifecycle Manager 4.3 podría permitir que un usuario autenticado manipule los datos del nombre de usuario debido a una validación de entrada incorrecta. ID de IBM X-Force: 271228. • https://exchange.xforce.ibmcloud.com/vulnerabilities/271228 https://www.ibm.com/support/pages/node/7091157 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

IBM Security Guardium Key Lifecycle Manager 4.3 contains plain text hard-coded credentials or other secrets in source code repository. IBM X-Force ID: 271220. IBM Security Guardium Key Lifecycle Manager 4.3 contiene credenciales codificadas en texto plano u otros secretos en el repositorio de código fuente. ID de IBM X-Force: 271220. • https://exchange.xforce.ibmcloud.com/vulnerabilities/271220 https://www.ibm.com/support/pages/node/7091157 • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution. Un atacante que envía paquetes de datos especialmente manipulados a Mobile Device Server puede provocar daños en la memoria, lo que podría provocar una denegación de servicio (DoS) o la ejecución de código. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WLAvalancheService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. • https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution. Un atacante que envía paquetes de datos especialmente manipulados a Mobile Device Server puede provocar daños en la memoria, lo que podría provocar una denegación de servicio (DoS) o la ejecución de código. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WLInfoRailService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. • https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt • CWE-787: Out-of-bounds Write •