6.5
CVE-2023-50959
- EPSS 0.05%
- Veröffentlicht 31.03.2024 12:15:50
- Zuletzt bearbeitet 21.11.2024 08:37:36
- Quelle psirt@us.ibm.com
- Teams Watchlist Login
- Unerledigt Login
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2,19.0.1, 19.0.2, 19.0.3,20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1,2 2.0.2, 23.0.1, and 23.0.2 may allow end users to query more documents than expected from a connected Enterprise Content Management system when configured to use a system account. IBM X-Force ID: 275938.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Cloud Pak For Business Automation Version18.0.0
Ibm ≫ Cloud Pak For Business Automation Version18.0.1
Ibm ≫ Cloud Pak For Business Automation Version18.0.2
Ibm ≫ Cloud Pak For Business Automation Version19.0.1
Ibm ≫ Cloud Pak For Business Automation Version19.0.2
Ibm ≫ Cloud Pak For Business Automation Version19.0.3
Ibm ≫ Cloud Pak For Business Automation Version20.0.1
Ibm ≫ Cloud Pak For Business Automation Version20.0.2
Ibm ≫ Cloud Pak For Business Automation Version20.0.3
Ibm ≫ Cloud Pak For Business Automation Version21.0.1 Update-
Ibm ≫ Cloud Pak For Business Automation Version21.0.2 Update-
Ibm ≫ Cloud Pak For Business Automation Version21.0.3 Update-
Ibm ≫ Cloud Pak For Business Automation Version22.0.1 Update-
Ibm ≫ Cloud Pak For Business Automation Version22.0.2 Update-
Ibm ≫ Cloud Pak For Business Automation Version23.0.1 Update-
Ibm ≫ Cloud Pak For Business Automation Version23.0.2 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.165 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
psirt@us.ibm.com | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.