IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system.
References
Link | Resource |
---|---|
https://www.ibm.com/support/pages/node/7184194 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
07 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
First Time |
Microsoft
Ibm entirex Linux Ibm Microsoft windows Linux linux Kernel |
|
References | () https://www.ibm.com/support/pages/node/7184194 - Vendor Advisory |
27 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 15:15
Updated : 2025-07-07 18:15
NVD link : CVE-2024-56810
Mitre link : CVE-2024-56810
CVE.ORG link : CVE-2024-56810
JSON object : View
Products Affected
ibm
- entirex
microsoft
- windows
linux
- linux_kernel
CWE
CWE-209
Generation of Error Message Containing Sensitive Information