Total
91 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-1535 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130677. | |||||
CVE-2017-1485 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128623. | |||||
CVE-2017-1428 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
IBM Cognos Analytics 11.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 127583. | |||||
CVE-2017-1427 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 127579. | |||||
CVE-2016-9711 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
IBM Predictive Solutions Foundation (IBM Cognos Analytics 11.0) reveals sensitive information in detailed error messages that could aid an attacker in further attacks against the system. IBM X-Force ID: 119619. | |||||
CVE-2016-3032 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114516. | |||||
CVE-2016-3031 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998887. | |||||
CVE-2016-3015 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998887. | |||||
CVE-2016-0398 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
IBM Cognos Analytics (CA) 11.0 before 11.0.2 allows remote attackers to conduct content-spoofing attacks via a crafted URL. | |||||
CVE-2016-0217 | 1 Ibm | 1 Cognos Analytics | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to stored cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | |||||
CVE-2024-40703 | 1 Ibm | 2 Cognos Analytics, Cognos Analytics Reports | 2024-09-27 | N/A | 5.5 MEDIUM |
IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and IBM Cognos Analytics Reports for iOS 11.0.0.7 could allow a local attacker to obtain sensitive information in the form of an API key. An attacker could use this information to launch further attacks against affected applications. |