Page 186 of 2763 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212792. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, usa algoritmos criptográficos más débiles de lo esperado que podrían permitir a un atacante descifrar información altamente confidencial. IBM X-Force ID: 212792 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212792 • CWE-326: Inadequate Encryption Strength •

CVSS: 5.4EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212791. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, es vulnerable a un ataque de tipo cross-site scripting. Esta vulnerabilidad permite a usuarios insertar código JavaScript arbitrari... • https://exchange.xforce.ibmcloud.com/vulnerabilities/212791 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, podría permitir a un atacante remoto obtener información confidencial cuando es devuelto un mensaje de error técnico detallado en el navegador. Esta información pod... • https://exchange.xforce.ibmcloud.com/vulnerabilities/212788 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, usa un hash criptográfico unidireccional contra una entrada que no debería ser reversible, como una contraseña, pero el software no usa también una salt como parte de la entrada. IBM X-Force ID: 212... • https://exchange.xforce.ibmcloud.com/vulnerabilities/212785 • CWE-916: Use of Password Hash With Insufficient Computational Effort •

CVSS: 5.9EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, podría permitir a un atacante remoto obtener información confidencial, causado por el fallo en la habilitación inap... • https://exchange.xforce.ibmcloud.com/vulnerabilities/212783 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1 no establece el atributo de seg... • https://exchange.xforce.ibmcloud.com/vulnerabilities/212782 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 6.2EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 stores user credentials in plain clear text which can be read by a local user. X-Force ID: 212781. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, almacena las credenciales de usuario en texto sin cifrar que puede ser leído por un usuario local. IBM X-Force ID: 212781 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212781 • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1 podría permitir a un usuario autenticado obtener información confidencial a partir de una petición HTTP especialmente diseñada. IBM X-Force ID: 212780 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212780 •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

15 Nov 2021 — IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, podría permitir a un usuario autenticado causar una denegación de servicio mediante peticiones HTTP especialmente diseñadas. IBM X-Force ID: 212779 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212779 •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

11 Nov 2021 — A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability. Se ha encontrado un fallo en el kernel de Linux. Una vulnerabilidad de uso de memoria previamente liberada en la pila NFC puede conllevar a una amenaza a la confidencialidad, integridad y disponibilidad del sistema It was discovered that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface ... • https://bugzilla.redhat.com/show_bug.cgi?id=2000585 • CWE-416: Use After Free •