Summary
Detail | |||
---|---|---|---|
Vendor | Ibm | First view | 2017-02-01 |
Product | Security Key Lifecycle Manager | Last view | 2021-11-23 |
Version | 2.6.0.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:ibm:security_key_lifecycle_manager |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2021-11-23 | CVE-2021-38980 | IBM Tivoli Key Lifecycle Manager (IBM Security Guardium Key Lifecycle Manager) 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212786. |
7.5 | 2021-11-15 | CVE-2021-38984 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793. |
7.5 | 2021-11-15 | CVE-2021-38983 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212792. |
5.4 | 2021-11-15 | CVE-2021-38982 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212791. |
5.3 | 2021-11-15 | CVE-2021-38981 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788. |
7.5 | 2021-11-15 | CVE-2021-38979 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785. |
5.9 | 2021-11-15 | CVE-2021-38978 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783. |
4.3 | 2021-11-15 | CVE-2021-38977 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782. |
5.5 | 2021-11-15 | CVE-2021-38976 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 stores user credentials in plain clear text which can be read by a local user. X-Force ID: 212781. |
6.5 | 2021-11-15 | CVE-2021-38975 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780. |
6.5 | 2021-11-15 | CVE-2021-38974 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779. |
4.3 | 2021-11-12 | CVE-2021-38985 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
2.7 | 2021-11-12 | CVE-2021-38973 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
4.3 | 2021-11-12 | CVE-2021-38972 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
2.7 | 2020-12-17 | CVE-2020-4846 | IBM Security Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190290. |
5.4 | 2020-12-17 | CVE-2020-4845 | IBM Security Key Lifecycle Manager 3.0.1 and 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190289. |
6.1 | 2019-10-04 | CVE-2019-4564 | IBM Security Key Lifecycle Manager 2.6, 2.7, 3.0, and 3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
5.3 | 2019-10-04 | CVE-2019-4514 | IBM Security Key Lifecycle Manager 2.6, 2.7, 3.0, and 3.0.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 165136. |
5.5 | 2019-09-24 | CVE-2019-4566 | IBM Security Key Lifecycle Manager 3.0 and 3.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 166627. |
6.5 | 2019-09-24 | CVE-2019-4515 | IBM Security Key Lifecycle Manager 3.0 and 3.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 165137. |
7.5 | 2019-09-20 | CVE-2019-4565 | IBM Security Key Lifecycle Manager 3.0 and 3.0.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 166626. |
7.5 | 2019-01-23 | CVE-2018-1751 | IBM Security Key Lifecycle Manager 3.0 through 3.0.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 148512. |
7.1 | 2018-10-15 | CVE-2018-1747 | IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 148428. |
6.5 | 2018-10-15 | CVE-2018-1744 | IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 148423. |
7.5 | 2018-10-11 | CVE-2018-1745 | IBM Security Key Lifecycle Manager 2.7 and 3.0 could allow an unauthenticated user to restart the SKLM server due to missing authentication. IBM X-Force ID: 148424. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
21% (11) | CWE-200 | Information Exposure |
9% (5) | CWE-326 | Inadequate Encryption Strength |
9% (5) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (3) | CWE-352 | Cross-Site Request Forgery (CSRF) |
5% (3) | CWE-284 | Access Control (Authorization) Issues |
5% (3) | CWE-209 | Information Exposure Through an Error Message |
5% (3) | CWE-20 | Improper Input Validation |
3% (2) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
3% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-798 | Use of Hard-coded Credentials |
1% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
1% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (1) | CWE-532 | Information Leak Through Log Files |
1% (1) | CWE-522 | Insufficiently Protected Credentials |
1% (1) | CWE-521 | Weak Password Requirements |
1% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (1) | CWE-319 | Cleartext Transmission of Sensitive Information |
1% (1) | CWE-312 | Cleartext Storage of Sensitive Information |
1% (1) | CWE-311 | Missing Encryption of Sensitive Data |
1% (1) | CWE-306 | Missing Authentication for Critical Function |
1% (1) | CWE-287 | Improper Authentication |
1% (1) | CWE-255 | Credentials Management |
1% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-08-06 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4262.nasl - Type: ACT_GATHER_INFO |