cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-29669,https://securityvulnerability.io/vulnerability/CVE-2021-29669,Cross-Site Scripting Vulnerability in IBM Jazz Foundation,"The IBM Jazz Foundation versions 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 are susceptible to a cross-site scripting vulnerability. Attackers can exploit this issue by injecting arbitrary JavaScript code within the Web UI. This manipulation can alter the intended functionality of the application and may result in unauthorized access to user credentials during a trusted session. Proper mitigation strategies should be implemented to protect against such vulnerabilities.",IBM,Jazz Foundation,5.4,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-12T02:15:00.000Z,0 CVE-2023-45181,https://securityvulnerability.io/vulnerability/CVE-2023-45181,Cross-Site Scripting Vulnerability in IBM Jazz Foundation,"The IBM Jazz Foundation, specifically version 7.0.2 and earlier, is susceptible to a cross-site scripting vulnerability that enables the injection of arbitrary JavaScript code into the Web user interface. This flaw may compromise the integrity of user sessions, allowing attackers to manipulate web content and potentially expose sensitive information, including user credentials. Promptly addressing this vulnerability is essential to safeguard against unauthorized access within trusted environments.",IBM,Jazz Foundation,6.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-25T16:15:00.000Z,0 CVE-2023-26280,https://securityvulnerability.io/vulnerability/CVE-2023-26280,Jazz Foundation Vulnerability: Improper Access Control Exposes Dashboard Changes,"IBM Jazz Foundation versions 7.0.2 and 7.0.3 contain a vulnerability that enables users to alter their dashboards through specially crafted HTTP requests. This flaw arises from improper access control mechanisms, which can be exploited to gain unauthorized access to user settings. Organizations utilizing these versions should implement necessary updates and review security protocols to protect against potential exploitation.",IBM,Jazz Foundation,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-25T15:51:46.104Z,0