CVE-2022-42435
04.01.2023, 00:15
IBM Business Automation Workflow 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, and 22.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 238054.
Vendor | Product | Version |
---|---|---|
ibm | business_automation_workflow | 18.0.0 |
ibm | business_automation_workflow | 18.0.1 |
ibm | business_automation_workflow | 18.0.2 |
ibm | business_automation_workflow | 19.0.1 |
ibm | business_automation_workflow | 19.0.2 |
ibm | business_automation_workflow | 19.0.3 |
ibm | business_automation_workflow | 20.0.1 |
ibm | business_automation_workflow | 20.0.2 |
ibm | business_automation_workflow | 20.0.3 |
ibm | business_automation_workflow | 21.0.1 |
ibm | business_automation_workflow | 21.0.1:if001 |
ibm | business_automation_workflow | 21.0.1:if002 |
ibm | business_automation_workflow | 21.0.1:if003 |
ibm | business_automation_workflow | 21.0.1:if004 |
ibm | business_automation_workflow | 21.0.1:if005 |
ibm | business_automation_workflow | 21.0.1:if006 |
ibm | business_automation_workflow | 21.0.1:if007 |
ibm | business_automation_workflow | 21.0.2 |
ibm | business_automation_workflow | 21.0.2:if001 |
ibm | business_automation_workflow | 21.0.2:if002 |
ibm | business_automation_workflow | 21.0.2:if003 |
ibm | business_automation_workflow | 21.0.2:if004 |
ibm | business_automation_workflow | 21.0.2:if005 |
ibm | business_automation_workflow | 21.0.2:if006 |
ibm | business_automation_workflow | 21.0.2:if007 |
ibm | business_automation_workflow | 21.0.2:if008 |
ibm | business_automation_workflow | 21.0.2:if009 |
ibm | business_automation_workflow | 21.0.2:if010 |
ibm | business_automation_workflow | 21.0.2:if011 |
ibm | business_automation_workflow | 21.0.2:if012 |
ibm | business_automation_workflow | 21.0.3 |
ibm | business_automation_workflow | 21.0.3:if001 |
ibm | business_automation_workflow | 21.0.3:if002 |
ibm | business_automation_workflow | 21.0.3:if003 |
ibm | business_automation_workflow | 21.0.3:if004 |
ibm | business_automation_workflow | 21.0.3:if005 |
ibm | business_automation_workflow | 21.0.3:if006 |
ibm | business_automation_workflow | 21.0.3:if007 |
ibm | business_automation_workflow | 21.0.3:if008 |
ibm | business_automation_workflow | 21.0.3:if009 |
ibm | business_automation_workflow | 21.0.3:if010 |
ibm | business_automation_workflow | 21.0.3:if011 |
ibm | business_automation_workflow | 21.0.3:if012 |
ibm | business_automation_workflow | 21.0.3:if013 |
ibm | business_automation_workflow | 21.0.3:if014 |
ibm | business_automation_workflow | 21.0.3:if015 |
ibm | business_automation_workflow | 22.0.1 |
ibm | business_automation_workflow | 22.0.1:if001 |
ibm | business_automation_workflow | 22.0.1:if002 |
ibm | business_automation_workflow | 22.0.1:if003 |
ibm | business_automation_workflow | 22.0.1:if004 |
ibm | business_automation_workflow | 22.0.1:if005 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration