IBM Security Verify Access could allow a user, using man...
Moderate severity
Unreviewed
Published
Apr 1, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Mar 31, 2022
Published to the GitHub Advisory Database
Apr 1, 2022
Last updated
Jan 27, 2023
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
References