Описание
IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to conduct XPath injection attacks, and call XPath extension functions, via unspecified vectors.
Ссылки
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00248
Низкий
5 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
больше 3 лет назад
IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to conduct XPath injection attacks, and call XPath extension functions, via unspecified vectors.
EPSS
Процентиль: 48%
0.00248
Низкий
5 Medium
CVSS2
Дефекты
CWE-94