IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to conduct XPath injection attacks, and call XPath extension functions, via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21626697 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg24034373 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79116 - |
Information
Published : 2013-03-05 05:02
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4840
Mitre link : CVE-2012-4840
CVE.ORG link : CVE-2012-4840
JSON object : View
Products Affected
ibm
- cognos_business_intelligence
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')