IBM Exploited Vulnerabilities
Ibm vulnerabilities known to be exploited. Over the past 365 days, sorted by exploit discovery date.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
IBM Security Verify Access Vulnerability Could Lead to Phishing Attacks
CVE-2024-35133IBMSecurity Verify AccessπΎπ‘8.2HIGHUnauthorized Access to RGW for Ceph in Spectrum Fusion HCI 2.5.2-2.7.2
CVE-2023-43040IBMSpectrum Fusion HciπΎπ‘6.5MEDIUMIBM Personal Communications Vulnerable to Remote Code Execution and Local Privilege Escalation
CVE-2024-25029IBMPersonal CommunicationsπΎπ‘π°9CRITICALMaximo Suite Vulnerable to Remote File Access Attack
CVE-2024-22328IBMMaximo Application SuiteπΎπ‘7.5HIGH
No more vulnerabilities to load.