IBM Cognos Controller 11.0.0 and 11.0.1 could be vulnerable to malicious file upload by not validating the type of file uploaded to Journal entry attachments. Attackers can make use of this weakness and upload malicious executable files into the system that can be sent to victims for performing further attacks.

CISA Cybersecurity Best Practices


CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.

Listed: