Export limit exceeded: 333745 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 333745 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (193 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-1411 1 Ibm 1 Security Verify Directory 2026-02-26 7.8 High
IBM Security Verify Directory Container 10.0.0.0 through 10.0.3.1 could allow a local user to execute commands as root due to execution with unnecessary privileges.
CVE-2024-47120 2 Ibm, Linux 2 Security Verify Information Queue, Linux Kernel 2026-02-26 6.4 Medium
IBM Security Verify Information Queue 10.0.5, 10.0.6, 10.0.7, and 10.0.8 could allow a privileged user to escalate their privileges and attack surface on the host due to the containers running with unnecessary privileges.
CVE-2024-43187 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2025-12-15 5.9 Medium
IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
CVE-2024-45657 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2025-12-15 5 Medium
IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment.
CVE-2024-45659 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2025-12-15 5.3 Medium
IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system.
CVE-2024-40700 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2025-12-15 6.1 Medium
IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-36354 1 Ibm 4 Security Verify Access, Security Verify Access Docker, Verify Identity Access and 1 more 2025-12-15 7.3 High
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow an unauthenticated user to execute arbitrary commands with lower user privileges on the system due to improper validation of user supplied input.
CVE-2025-36355 1 Ibm 4 Security Verify Access, Security Verify Access Docker, Verify Identity Access and 1 more 2025-12-15 8.5 High
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.
CVE-2025-36356 1 Ibm 4 Security Verify Access, Security Verify Access Docker, Verify Identity Access and 1 more 2025-12-15 9.3 Critical
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to escalate their privileges to root due to execution with more privileges than required.
CVE-2024-35142 1 Ibm 1 Security Verify Access Docker 2025-11-03 8.4 High
IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges. IBM X-Force ID: 292418.
CVE-2024-35141 1 Ibm 2 Db2, Security Verify Access Docker 2025-11-03 7.8 High
IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges.
CVE-2024-35140 1 Ibm 1 Security Verify Access Docker 2025-11-03 7.7 High
IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to improper certificate validation. IBM X-Force ID: 292416.
CVE-2024-31871 1 Ibm 1 Security Verify Access 2025-11-03 7.5 High
IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Python scripts due to improper certificate validation. IBM X-Force ID: 287306.
CVE-2023-38371 1 Ibm 2 Security Access Manager, Security Verify Access Docker 2025-11-03 5.9 Medium
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 261198.
CVE-2023-38370 1 Ibm 2 Security Access Manager, Security Verify Access Docker 2025-11-03 7.5 High
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1, under certain configurations, could allow a user on the network to install malicious packages. IBM X-Force ID: 261197.
CVE-2023-25927 1 Ibm 1 Security Verify Access 2025-11-03 6.5 Medium
IBM Security Verify Access 10.0.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, and 10.0.5 could allow an attacker to crash the webseald process using specially crafted HTTP requests resulting in loss of access to the system. IBM X-Force ID: 247635.
CVE-2025-36087 1 Ibm 3 Security Verify Access, Security Verify Access Docker, Verify Identity Access 2025-10-20 8.1 High
IBM Security Verify Access 10.0.0 through 10.0.9, 11.0.0, IBM Verify Identity Access Container 10.0.0 through 10.0.9, and 11.0.0, under certain configurations, contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVE-2024-45669 2 Ibm, Linux 2 Security Verify Information Queue, Linux Kernel 2025-09-17 6.5 Medium
IBM Security Verify Information Queue 10.0.5, 10.0.6, 10.0.7, and 10.0.8 could allow a remote user to cause a denial of service due to improper handling of special characters that could lead to uncontrolled resource consumption.
CVE-2024-45671 2 Ibm, Linux 2 Security Verify Information Queue, Linux Kernel 2025-09-17 5.9 Medium
IBM Security Verify Information Queue 10.0.5, 10.0.6, 10.0.7, and 10.0.8 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2025-36003 1 Ibm 1 Security Verify Governance 2025-09-16 7.5 High
IBM Security Verify Governance Identity Manager 10.0.2 could allow a remote attacker to obtain sensitive information when detailed technical error messages are returned. This information could be used in further attacks against the system.