Total vulnerabilities in the database
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Software | From | Fixed in |
---|---|---|
ibm / security_verify_access | 10.0.0 | 10.0.0.x |
ibm / security_verify_access | 10.0.1 | 10.0.1.x |
ibm / security_verify_access | 10.0.2 | 10.0.2.x |
ibm / security_verify_access | 10.0.3 | 10.0.3.x |