3 results (0.002 seconds)

CVSS: 2.5EPSS: 0%CPEs: 8EXPL: 0

IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 allows local users to bypass the Cognos Application Firewall (CAF) protection mechanism via leading whitespace in the BackURL field. IBM Tivoli Common Reporting (TCR) 2.1 en versiones anteriores a IF14, 2.1.1 en versiones anteriores a IF22, 2.1.1.2 en versiones anteriores a IF9, 3.1.0.0 hasta la versión 3.1.2 como se utiliza en Cognos Business Intelligence en versiones anteriores a 10.2 IF16 y 3.1.2.1 como se utiliza en Cognos Business Intelligence en versiones anteriores a 10.2.1.1 IF12 permite a usuarios locales eludir el mecanimo de protección Cognos Application Firewall (CAF) a través de espacios en blanco encabezando el campo BackURL. • http://www-01.ibm.com/support/docview.wss?uid=swg21972799 • CWE-254: 7PK - Security Features •

CVSS: 2.5EPSS: 0%CPEs: 8EXPL: 0

IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 preserves user permissions across group-add and group-remove operations, which allows local users to bypass intended access restrictions in opportunistic circumstances by leveraging administrative changes to group membership. IBM Tivoli Common Reporting (TCR) 2.1 en versiones anteriores a IF14, 2.1.1 en versiones anteriores a IF22, 2.1.1.2 en versiones anteriores a IF9, 3.1.0.0 hasta la versión 3.1.2 como se utiliza en Cognos Business Intelligence en versiones anteriores a 10.2 IF16 y 3.1.2.1 como se utiliza en Cognos Business Intelligence en versiones anteriores a 10.2.1.1 IF12 conserva permisos de usuario en las operaciones añadir-grupo y eleminar-grupo, lo que permite a usuarios locales eludir las restricciones destinadas al acceso en circunstancias oportunistas aprovechando cambios administrativos a miembros del grupo. • http://www-01.ibm.com/support/docview.wss?uid=swg21972799 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 97%CPEs: 21EXPL: 2

Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library. Interfaces de objetos serializados en determinados productos IBM analytics, business solutions, cognitive, IT infrastructure y mobile and social permiten a atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado, relacionado con la clase InvokerTransformer en la librería Apache Commons Collections. Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands • https://www.exploit-db.com/exploits/41613 http://www-01.ibm.com/support/docview.wss?uid=swg21970575 http://www-01.ibm.com/support/docview.wss?uid=swg21971342 http://www-01.ibm.com/support/docview.wss?uid=swg21971376 http://www-01.ibm.com/support/docview.wss?uid=swg21971733 http://www-01.ibm.com/support/docview.wss? •