Ibm Corporation Cognos Business Intelligence vulnerabilities

4 known vulnerabilities affecting ibm_corporation/cognos_business_intelligence.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2016-8960HIGHCVSS 8.8v10.2v10.2.1+3 more2017-03-27
CVE-2016-8960 [HIGH] CWE-264 CVE-2016-8960: IBM Cognos Business Intelligence 10.2 could allow a user with lower privilege Capabilities to adopt IBM Cognos Business Intelligence 10.2 could allow a user with lower privilege Capabilities to adopt the Capabilities of a higher-privilege user by intercepting the higher-privilege user's cookie value from its HTTP request and then reusing it in subsequent requests. IBM Reference #: 1993718.
cvelistv5nvd
CVE-2016-9985MEDIUMCVSS 5.5v10v10.1+6 more2017-03-08
CVE-2016-9985 [MEDIUM] CWE-532 CVE-2016-9985: IBM Cognos Server 10.1.1 and 10.2 stores highly sensitive information in log files that could be rea IBM Cognos Server 10.1.1 and 10.2 stores highly sensitive information in log files that could be read by a local user. IBM Reference #: 1999671.
cvelistv5nvd
CVE-2016-0218MEDIUMCVSS 5.4v10v8.3.0+9 more2017-02-01
CVE-2016-0218 [MEDIUM] CWE-79 CVE-2016-0218: IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to cross-site scripting, ca IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked.
cvelistv5nvd
CVE-2016-0217MEDIUMCVSS 5.4v10v8.3.0+9 more2017-02-01
CVE-2016-0217 [MEDIUM] CWE-79 CVE-2016-0217: IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to stored cross-site script IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to stored cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site
cvelistv5nvd