2022-03-31 17:30:17
ibm
PUBLISHED
IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.