IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 could allow a local attacker to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Security_identity_governance_and_intelligence | Ibm | 5.2 (including) | 5.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.1 (including) | 5.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2 (including) | 5.2.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2.1 (including) | 5.2.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3 (including) | 5.2.3 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.1 (including) | 5.2.3.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.2 (including) | 5.2.3.2 (including) |