5
CVE-2025-13995
- EPSS 0.05%
- Veröffentlicht 19.03.2026 01:55:42
- Zuletzt bearbeitet 23.03.2026 18:07:04
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM QRadar SIEM Information Disclosure
IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 could allow an attacker with access to one tenant to access hostname data from another tenant's account.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Update-
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_1
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_10
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_11
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_12
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_13
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_14
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_2
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_3
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_4
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_5
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_6
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_7
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_8
Ibm ≫ Qradar Security Information And Event Manager Version7.5.0 Updateupdate_pack_9
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.156 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 5 | 3.1 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
|
CWE-1286 Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.