{"id":62185,"date":"2025-02-23T07:00:38","date_gmt":"2025-02-23T04:00:38","guid":{"rendered":"https:\/\/www.tenable.com\/cve\/CVE-2024-22341"},"modified":"2025-02-23T07:00:38","modified_gmt":"2025-02-23T04:00:38","slug":"cve-2024-22341","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2024-22341\/","title":{"rendered":"CVE-2024-22341"},"content":{"rendered":"<h4 class=\"border-bottom pb-1\">Description<\/h4>\n<p>IBM Watson Query on Cloud Pak for Data 4.0.0 through 4.0.9, 4.5.0 through 4.5.3, 4.6.0 through 4.6.6, 4.7.0 through 4.7.4, and 4.8.0 through 4.8.7 could allow unauthorized data access from a remote data source object due to improper privilege management.<\/p>\n<h4 class=\"border-bottom pb-1\">References<\/h4>\n<p><a target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.ibm.com\/support\/pages\/node\/7183851\">https:\/\/www.ibm.com\/support\/pages\/node\/7183851<\/a><\/p>\n<p>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647 &#8211; \u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description IBM Watson Query on Cloud Pak for Data 4.0.0 through 4.0.9, 4.5.0 through 4.5.3, 4.6.0 through 4.6.6, 4.7.0 through 4.7.4, and 4.8.0 through 4.8.7 could allow unauthorized data access from a remote data source object due to improper privilege management. References https:\/\/www.ibm.com\/support\/pages\/node\/7183851 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647 &#8211; \u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[663,236,661,662],"class_list":["post-62185","post","type-post","status-publish","format-standard","hentry","category-vulnerability","tag-cve","tag-236","tag-661","tag-662"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=62185"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62185\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=62185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=62185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=62185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}