IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7176208 |
|
History
Tue, 19 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ibm engineering Lifecycle Optimization - Engineering Insights
Linux Linux linux Kernel Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.2:-:*:*:*:*:*:* cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.3:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm engineering Lifecycle Optimization - Engineering Insights
Linux Linux linux Kernel Microsoft Microsoft windows |
Fri, 15 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Nov 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | |
| Title | IBM Engineering Insights XML external entity injection | |
| First Time appeared |
Ibm
Ibm engineering Insights |
|
| Weaknesses | CWE-611 | |
| CPEs | cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:engineering_insights:7.0.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm engineering Insights |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2024-11-15T16:13:12.535Z
Updated: 2024-11-15T17:15:35.473Z
Reserved: 2024-06-28T09:34:20.322Z
Link: CVE-2024-39726
Updated: 2024-11-15T17:15:30.482Z
Status : Analyzed
Published: 2024-11-15T17:15:19.983
Modified: 2024-11-19T21:51:40.093
Link: CVE-2024-39726
No data.