Page 3 of 68 results (0.013 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 Dec 2024 — IBM Cognos Controller 11.0.0 and 11.0.1 could be vulnerable to malicious file upload by not validating the type of file uploaded to Journal entry attachments. Attackers can make use of this weakness and upload malicious executable files into the system that can be sent to victims for performing further attacks. • https://www.ibm.com/support/pages/node/7177220 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

03 Dec 2024 — IBM Cognos Controller 11.0.0 and 11.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. • https://www.ibm.com/support/pages/node/7177220 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 196643. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 es vulnerable a la inyección SQL. Un atacante remoto podría enviar declaraciones SQL especialmente diseñadas, que podrían permitirle ver, agregar, modificar o eliminar información en la base de dato... • https://exchange.xforce.ibmcloud.com/vulnerabilities/196643 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to external service interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 220903. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 ... • https://exchange.xforce.ibmcloud.com/vulnerabilities/220903 • CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to injection attacks in application logging by not sanitizing user provided data. IBM X-Force ID: 251463. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 es vulnerable a ataques de inyección en el registro de aplicaciones al no desinfectar los datos proporcionados por el usuario. ID de IBM X-Force: 251463. • https://exchange.xforce.ibmcloud.com/vulnerabilities/251463 • CWE-117: Improper Output Neutralization for Logs •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 262183. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 es vulnerable a la inyección SQL. Un atacante remoto podría enviar declaraciones SQL especialmente manipuladas, que podrían permitirle ver, agregar, modificar o eliminar información en la base de da... • https://exchange.xforce.ibmcloud.com/vulnerabilities/262183 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 could allow a remote user to enumerate usernames due to differentiating error messages on existing usernames. IBM X-Force ID: 199181. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 podrían permitir que un usuario remoto enumere nombres de usuarios debido a mensajes de error diferenciadores en nombres de usuarios existentes. ID de IBM X-Force: 199181. • https://exchange.xforce.ibmcloud.com/vulnerabilities/199181 • CWE-204: Observable Response Discrepancy •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. IBM X-Force ID: 245403. IBM Cognos Controller 10.4.1, 10.4.2 y 11.0.0 podría permitir a un atacante remoto obtener información confidencial cuando se devuelve un seguimiento de la pila en el navegador. ID de IBM X-Force: 245403. • https://exchange.xforce.ibmcloud.com/vulnerabilities/245403 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

22 Apr 2022 — An authentication bypass vulnerability was discovered in an internal service of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware during an that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected. Se ha detectado una vulnerabilidad de omisión de autenticación en un servicio interno del firmware de Lenovo Fan Power Controller2 (FPC2) y Lenovo System Management Module (SMM) durante un que podría permitir a un atacante ... • https://support.lenovo.com/us/en/product_security/LEN-72615 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

22 Apr 2022 — An authentication bypass vulnerability was discovered in the web interface of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected. Se ha detectado una vulnerabilidad de omisión de autenticación en la interfaz web del firmware de Lenovo Fan Power Controller2 (FPC2) y Lenovo System Management Module (SMM) que podría permitir a un atacante no autenticado ejecutar com... • https://support.lenovo.com/us/en/product_security/LEN-72615 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •