IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7178098 |
|
History
Fri, 25 Jul 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ibm storage Scale
Linux Linux linux Kernel |
|
| CPEs | cpe:2.3:a:ibm:storage_scale:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm storage Scale
Linux Linux linux Kernel |
Mon, 16 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 14 Dec 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements. | |
| Title | IBM Storage Scale SQL injection | |
| First Time appeared |
Ibm
Ibm spectrum Scale Container Native Storage Access |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.1.9.6:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.2.1.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm spectrum Scale Container Native Storage Access |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2024-12-14T12:58:45.625Z
Updated: 2024-12-16T17:05:18.045Z
Reserved: 2024-04-07T12:44:57.195Z
Link: CVE-2024-31892
Updated: 2024-12-16T17:05:11.745Z
Status : Analyzed
Published: 2024-12-14T13:15:18.877
Modified: 2025-07-25T20:57:25.377
Link: CVE-2024-31892
No data.