Lucene search

K

7 matches found

CVE
CVE
added 2020/06/29 2:15 p.m.42 views

CVE-2020-4452

IBM API Connect V2018.4.1.0 through 2018.4.1.11 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 181324.

7.5CVSS7.2AI score0.00112EPSS
CVE
CVE
added 2020/05/12 2:15 p.m.36 views

CVE-2020-4346

IBM API Connect's V2018.4.1.0 through 2018.4.1.10 management server has an unsecured api which can be exploited by an unauthenticated attacker to obtain sensitive information. IBM X-Force ID: 178322.

5.3CVSS5AI score0.00174EPSS
CVE
CVE
added 2020/09/03 2:15 p.m.36 views

CVE-2020-4638

IBM API Connect's API Manager 2018.4.1.0 through 2018.4.1.12 is vulnerable to privilege escalation. An invitee to an API Provider organization can escalate privileges by manipulating the invitation link. IBM X-Force ID: 185508.

7.2CVSS6.9AI score0.00522EPSS
CVE
CVE
added 2020/03/24 4:15 p.m.34 views

CVE-2019-4553

IBM API Connect V5.0.0.0 through 5.0.8.7iFix3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 165958.

7.5CVSS7.2AI score0.00146EPSS
CVE
CVE
added 2020/06/12 1:15 p.m.33 views

CVE-2020-4251

IBM API Connect 5.0.0.0 through 5.0.8.8 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 175489.

5.4CVSS5.2AI score0.00179EPSS
CVE
CVE
added 2020/09/03 2:15 p.m.33 views

CVE-2020-4337

IBM API Connect 2018.4.1.0 through 2018.4.1.12 could allow an attacker to launch phishing attacks by tricking the server to generate user registration emails that contain malicious URLs. IBM X-Force ID: 177933.

6.5CVSS6.2AI score0.00192EPSS
CVE
CVE
added 2020/05/12 2:15 p.m.32 views

CVE-2020-4195

IBM API Connect V2018.4.1.0 through 2018.4.1.10 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attack...

5.4CVSS5.4AI score0.00086EPSS