Page 4 of 31 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 13EXPL: 0

The Jazz Team Server component in IBM Security AppScan Enterprise 8.x before 8.8 has a default username and password, which makes it easier for remote authenticated users to obtain unspecified access to this component by leveraging this credential information in an environment with applicable component installation details. El componente Jazz Team Server en IBM Security AppScan Enterprise 8.x anteriores a 8.8 tiene un nombre de usuario y contraseña por defecto, lo cual permite a usuarios remotamente autenticados obtener acceso no especificado a este componente utilizando estas credenciales en un entorno con detalles de instalación aplicables. • http://www-01.ibm.com/support/docview.wss?uid=swg21653287 https://exchange.xforce.ibmcloud.com/vulnerabilities/87562 • CWE-255: Credentials Management Errors •

CVSS: 3.5EPSS: 0%CPEs: 13EXPL: 0

IBM Security AppScan Enterprise 8.x before 8.8 sends a cleartext AppScan Source database password in a response, which allows remote authenticated users to obtain sensitive information, and subsequently conduct man-in-the-middle attacks, by examining the response content. IBM Security AppScan Enterprise 8.x anterior a 8.8 envía a la base de datos AppScan Source una contraseña sin cifrar en una respuesta, que permite a los usuarios autenticados remotos obtener información sensible, y, posteriormente, llevar a cabo ataques man-in-the-middle, examinando el contenido de la respuesta. • http://www-01.ibm.com/support/docview.wss?uid=swg21653287 https://exchange.xforce.ibmcloud.com/vulnerabilities/84975 • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 0%CPEs: 17EXPL: 0

The SSL implementation in IBM Security AppScan Enterprise before 8.7.0.1 enables cipher suites with weak encryption algorithms, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. La implementación SSL en IBM Security AppScan Enterprise anteriores a 8.7.0.1 activa suites de cifrado con algorimtos de cifrado débiles, lo cual facilita a atacantes remotos obtener información sensible mediante la captura de datos en la red. • http://www-01.ibm.com/support/docview.wss?uid=swg21640352 https://exchange.xforce.ibmcloud.com/vulnerabilities/84707 • CWE-310: Cryptographic Issues •

CVSS: 1.7EPSS: 0%CPEs: 16EXPL: 0

IBM Security AppScan Enterprise before 8.7 does not invalidate the session context upon a logout action, which allows remote attackers to hijack sessions by leveraging an unattended workstation. IBM Security AppScan Enterprise anteriores a 8.7 no invalida el contexto de sesión en una acción de cierre de sesión, lo que permite a atacantes remotos secuestrar sesiones aprovechando estaciones de trabajo desatendidas. • http://www-01.ibm.com/support/docview.wss?uid=swg21640352 https://exchange.xforce.ibmcloud.com/vulnerabilities/84066 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 22EXPL: 0

The Manual Explore browser plug-in in IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 allows remote attackers to discover test Platform Authentication credentials via a crafted web site. El complemento de navegador Manual Explore en IBM Security AppScan Enterprise v5.6 y v8.x anterior a v8.7 e IBM Rational Policy Tester v5.6 y v8.x anterior a v8.5.0.4 que permite a atacantes remotos descubrir la prueba de Platform Authentication de credenciales a través de sitios web manipulados. • http://www-01.ibm.com/support/docview.wss?uid=swg21626264 http://www-01.ibm.com/support/docview.wss?uid=swg21631304 https://exchange.xforce.ibmcloud.com/vulnerabilities/81338 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •