Multiple vulnerabilities in IBM Security Verify Access can be exploited by an attacker to gain administrator rights, execute arbitrary code, bypass security measures, perform cross-site scripting attacks, and alter or disclose data.
| Vendor | Product | Versions |
|---|---|---|
| ibm | security verify access | — |