Page 28 of 182 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

IBM Security Guardium Big Data Intelligence (SonarG) 3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137777. IBM Security Guardium Big Data Intelligence (SonarG) 3.1 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite que los usuarios embeban código JavaScript arbitrario en la interfaz de usuario web, lo que altera las funcionalidades previstas. • http://www.ibm.com/support/docview.wss?uid=swg22016512 https://exchange.xforce.ibmcloud.com/vulnerabilities/137777 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

IBM Security Guardium Big Data Intelligence (SonarG) 3.1 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 136471. IBM Security Guardium Big Data Intelligence (SonarG) 3.1 genera un mensaje de error que incluye información sensible sobre su entorno, usuarios o datos asociados. IBM X-Force ID: 136471. • http://www.ibm.com/support/docview.wss?uid=swg22016515 http://www.securityfocus.com/bid/104493 https://exchange.xforce.ibmcloud.com/vulnerabilities/136471 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

IBM Security Guardium 10.0, 10.0.1, and 10.1 through 10.1.4 Database Activity Monitor does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 132624. En IBM Security Guardium 10.0, 10.0.1 y 10.1 hasta la 10.1.4, Database Activity Monitor no pide que los usuarios tengan contraseñas fuertes por defecto, lo que hace que sea más fácil que los atacantes comprometan las cuentas de usuario. IBM X-Force ID: 132624. • http://www.ibm.com/support/docview.wss?uid=swg22014230 http://www.securitytracker.com/id/1040899 https://exchange.xforce.ibmcloud.com/vulnerabilities/132624 • CWE-521: Weak Password Requirements •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

IBM Security Guardium 10.0, 10.0.1, and 10.1 through 10.1.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 124675. IBM Security Guardium 10.0, 10.0.1 y 10.1 hasta la 10.1.4 utiliza algoritmos criptográficos más débiles que lo esperado que podrían permitir que un atacante descifre información altamente sensible. IBM X-Force ID: 124675. • http://www.ibm.com/support/docview.wss?uid=swg22014537 https://exchange.xforce.ibmcloud.com/vulnerabilities/124675 • CWE-326: Inadequate Encryption Strength •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

IBM Security Guardium Database Activity Monitor 10 allows local users to have unspecified impact by leveraging administrator access to a hardcoded password, related to use on GRUB systems. IBM X-Force ID: 110326. IBM Security Guardium Database Activity Monitor 10 permite a los usuarios locales tener un impacto no especificado aprovechando el acceso de administrador a una contraseña embebida. Esto está relacionado con su uso en sistemas GRUB. IBM X-Force ID: 110326. • http://www-01.ibm.com/support/docview.wss?uid=swg21981748 https://exchange.xforce.ibmcloud.com/vulnerabilities/110326 • CWE-798: Use of Hard-coded Credentials •