Page 2 of 14 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, usa un hash criptográfico unidireccional contra una entrada que no debería ser reversible, como una contraseña, pero el software no usa también una salt como parte de la entrada. IBM X-Force ID: 212785 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212785 https://www.ibm.com/support/pages/node/6516034 • CWE-916: Use of Password Hash With Insufficient Computational Effort •

CVSS: 5.9EPSS: 0%CPEs: 12EXPL: 0

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, podría permitir a un atacante remoto obtener información confidencial, causado por el fallo en la habilitación inapropiada de HTTP Strict Transport Security. Un atacante podría aprovechar esta vulnerabilidad para obtener información confidencial usando técnicas de tipo de man in the middle. • https://exchange.xforce.ibmcloud.com/vulnerabilities/212783 https://www.ibm.com/support/pages/node/6516050 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 12EXPL: 0

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1 no establece el atributo de seguridad en los tokens de autorización o las cookies de sesión. los atacantes pueden ser capaces de obtener los valores de las cookies mediante el envío de un enlace http:// a un usuario o al plantar este enlace en un sitio al que el usuario vaya. • https://exchange.xforce.ibmcloud.com/vulnerabilities/212782 https://www.ibm.com/support/pages/node/6516052 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 6.2EPSS: 0%CPEs: 12EXPL: 0

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 stores user credentials in plain clear text which can be read by a local user. X-Force ID: 212781. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1, almacena las credenciales de usuario en texto sin cifrar que puede ser leído por un usuario local. IBM X-Force ID: 212781 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212781 https://www.ibm.com/support/pages/node/6516038 • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780. IBM Tivoli Key Lifecycle Manager versiones 3.0, 3.0.1, 4.0 y 4.1 podría permitir a un usuario autenticado obtener información confidencial a partir de una petición HTTP especialmente diseñada. IBM X-Force ID: 212780 • https://exchange.xforce.ibmcloud.com/vulnerabilities/212780 https://www.ibm.com/support/pages/node/6516044 •