IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2024-09-16T20:01:49.457Z
Reserved: 2022-01-03T00:00:00
Link: CVE-2022-22311

No data.

Status : Modified
Published: 2022-03-31T18:15:09.437
Modified: 2024-11-21T06:46:37.083
Link: CVE-2022-22311

No data.