Search Results (8 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-36114 1 Ibm 1 Soar Qradar Plugin App 2025-08-22 6.5 Medium
IBM QRadar SOAR Plugin App 1.0.0 through 5.6.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
CVE-2024-38319 1 Ibm 1 Soar 2024-11-21 7.5 High
IBM Security SOAR 51.0.2.0 could allow an authenticated user to execute malicious code loaded from a specially crafted script. IBM X-Force ID: 294830.
CVE-2023-38263 1 Ibm 1 Soar Qradar Plugin App 2024-11-21 6.5 Medium
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577.
CVE-2023-38020 1 Ibm 1 Soar Qradar Plugin App 2024-11-21 4.3 Medium
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576.
CVE-2023-38019 1 Ibm 1 Soar Qradar Plugin App 2024-11-21 8.1 High
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575.
CVE-2021-29785 2 Ibm, Linux 2 Soar, Linux Kernel 2024-11-21 5.9 Medium
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169.
CVE-2020-4635 2 Ibm, Redhat 2 Soar, Enterprise Linux 2024-11-21 5.3 Medium
IBM Resilient SOAR 40 and earlier could disclose sensitive information by allowing a user to enumerate usernames.
CVE-2024-45670 1 Ibm 1 Soar 2024-11-16 5.6 Medium
IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism.