| CVE-2025-36354 | IBM Security Verify Access和IBM Security Verify Access Docker 操作系统命令注入漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.3 | 2025-10-06 16:53:43 | 深度分析 |
| CVE-2025-36355 | IBM Security Verify Access(ISAM)和IBM Security Verify Access Docker 安全漏洞 | IBM | Security Verify Access Appliance | 高危 | 8.5 | 2025-10-06 16:52:31 | 深度分析 |
| CVE-2025-36356 | IBM Security Verify Access(ISAM)和IBM Security Verify Access Docker 安全漏洞 | IBM | Security Verify Access Appliance | 超危 | 9.3 | 2025-10-06 16:50:49 | 深度分析 |
| CVE-2024-49814 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.8 | 2025-02-06 00:10:33 | 深度分析 |
| CVE-2024-45657 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 5.0 | 2025-02-04 20:40:09 | 深度分析 |
| CVE-2024-35138 | IBM Security Verify Access 跨站请求伪造漏洞 | IBM | Security Verify Access Appliance | 中危 | 6.5 | 2025-02-04 20:38:34 | 深度分析 |
| CVE-2024-43187 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 5.9 | 2025-02-04 20:37:49 | 深度分析 |
| CVE-2024-45658 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 低危 | 2.7 | 2025-02-04 20:37:14 | 深度分析 |
| CVE-2024-40700 | IBM Security Verify Access 跨站脚本漏洞 | IBM | Security Verify Access Appliance | 中危 | 6.1 | 2025-02-04 20:36:10 | 深度分析 |
| CVE-2024-45659 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 5.3 | 2025-02-04 17:34:13 | 深度分析 |
| CVE-2024-31874 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 6.2 | 2024-04-10 16:02:21 | 深度分析 |
| CVE-2024-31873 | IBM Security Verify Access 信任管理问题漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.5 | 2024-04-10 15:58:43 | 深度分析 |
| CVE-2024-31871 | IBM Security verify Access Appliance 信任管理问题漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.5 | 2024-04-10 15:55:20 | 深度分析 |
| CVE-2024-31872 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.5 | 2024-04-10 15:51:04 | 深度分析 |
| CVE-2024-28787 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Container | 高危 | 8.7 | 2024-04-04 17:31:59 | 深度分析 |
| CVE-2023-38369 | IBM Security Access Manager Container 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 6.2 | 2024-02-07 16:15:04 | 深度分析 |
| CVE-2023-31002 | IBM Security Access Manager Container 安全漏洞 | IBM | Security Verify Access Appliance | 中危 | 5.1 | 2024-02-07 16:13:15 | 深度分析 |
| CVE-2023-43017 | IBM Security Verify Access 信任管理问题漏洞 | IBM | Security Verify Access Appliance | 高危 | 8.2 | 2024-02-07 16:10:54 | 深度分析 |
| CVE-2023-32330 | IBM Security Verify Access 信任管理问题漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.5 | 2024-02-07 16:09:01 | 深度分析 |
| CVE-2023-32328 | IBM Security Verify Access 安全漏洞 | IBM | Security Verify Access Appliance | 高危 | 7.5 | 2024-02-07 16:07:07 | 深度分析 |