cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-40752,https://securityvulnerability.io/vulnerability/CVE-2022-40752,Command Injection Vulnerability in IBM InfoSphere DataStage 11.7,"IBM InfoSphere DataStage 11.7 contains a command injection vulnerability that arises from the improper neutralization of special elements in user input. This flaw could allow remote attackers to execute arbitrary commands on the host system, potentially compromising data integrity and confidentiality.",IBM,Infosphere Datastage,9.8,CRITICAL,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-11-16T00:00:00.000Z,0 CVE-2016-8982,https://securityvulnerability.io/vulnerability/CVE-2016-8982,,"IBM InfoSphere Information Server stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.",IBM,Infosphere Datastage,5.3,MEDIUM,0.0012100000167265534,false,,false,false,false,,,false,false,,2017-02-01T22:00:00.000Z,0 CVE-2015-1900,https://securityvulnerability.io/vulnerability/CVE-2015-1900,,"IBM InfoSphere DataStage 8.1, 8.5, 8.7, 9.1, and 11.3 through 11.3.1.2 on UNIX allows local users to write to executable files, and consequently obtain root privileges, via unspecified vectors.",IBM,Infosphere Datastage,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-06-29T10:00:00.000Z,0 CVE-2012-0701,https://securityvulnerability.io/vulnerability/CVE-2012-0701,,"The client applications in the DataStage Administrator client in InfoSphere DataStage in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 rely on client-side access control, which allows remote authenticated users to gain privileges via unspecified vectors.",IBM,"Infosphere Information Server,Infosphere Datastage",,,0.0015800000401213765,false,,false,false,false,,,false,false,,2013-01-31T11:00:00.000Z,0 CVE-2011-3123,https://securityvulnerability.io/vulnerability/CVE-2011-3123,,"IBM InfoSphere Information Server 8.5 and 8.5.0.1 on Unix and Linux, as used in IBM InfoSphere DataStage 8.5 and 8.5.0.1 and other products, uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.",IBM,"Infosphere Datastage,Infosphere Information Server",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2011-08-10T20:55:00.000Z,0 CVE-2011-3124,https://securityvulnerability.io/vulnerability/CVE-2011-3124,,"IBM InfoSphere Information Server 8.5 and 8.5.0.1 on Unix and Linux, as used in IBM InfoSphere DataStage 8.5 and 8.5.0.1 and other products, assigns incorrect ownership to unspecified files, which allows local users to gain privileges via unknown vectors.",IBM,"Infosphere Datastage,Infosphere Information Server",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2011-08-10T20:55:00.000Z,0