IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Security_identity_governance_and_intelligence | Ibm | 5.2 (including) | 5.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.1 (including) | 5.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2 (including) | 5.2.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2.1 (including) | 5.2.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3 (including) | 5.2.3 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.1 (including) | 5.2.3.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.2 (including) | 5.2.3.2 (including) |