Page 3 of 14 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. IBM X-Force ID: 229198. IBM Robotic Process Automation versiones 21.0.1 y 21.0.2, podría permitir a un usuario con acceso psíquico al sistema obtener información confidencial debido a tokens de acceso insuficientemente protegidos. IBM X-Force ID: 229198 • https://exchange.xforce.ibmcloud.com/vulnerabilities/229198 https://www.ibm.com/support/pages/node/6597669 • CWE-522: Insufficiently Protected Credentials •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

IBM Robotic Process Automation 21.0.2 could allow a local user to obtain sensitive web service configuration credentials from system memory. IBM X-Force ID: 223026. IBM Robotic Process Automation versión 21.0.2, podría permitir a un usuario local obtener credenciales de configuración de servicios web confidenciales de la memoria del sistema. IBM X-Force ID: 223026 • https://exchange.xforce.ibmcloud.com/vulnerabilities/223026 https://www.ibm.com/support/pages/node/6596071 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 224156. IBM Robotic Process Automation versiones 21.0.1 y 21.0.2, es vulnerable a un ataque de Interacción de Servicios Externos, causado por la comprobación inapropiada de la entrada suministrada por el usuario. • https://exchange.xforce.ibmcloud.com/vulnerabilities/224156 https://www.ibm.com/support/pages/node/6573913 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

In AutomateAppCore.dll in Blue Prism Robotic Process Automation 6.4.0.8445, a vulnerability in access control can be exploited to escalate privileges. The vulnerability allows for abusing the application for fraud or unauthorized access to certain information. The attack requires a valid user account to connect to the Blue Prism server, but the roles associated to this account are not required to have any permissions. First of all, the application files are modified to grant full permissions on the client side. In a test environment (or his own instance of the software) an attacker is able to grant himself full privileges also on the server side. • http://packetstormsecurity.com/files/153007/Blue-Prism-Robotic-Process-Automation-RPA-Privilege-Escalation.html https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-002.txt • CWE-669: Incorrect Resource Transfer Between Spheres CWE-862: Missing Authorization •