{"id":2165,"date":"2024-05-09T08:05:24","date_gmt":"2024-05-09T08:05:24","guid":{"rendered":"https:\/\/www.redflare-cyber.com\/?p=2165"},"modified":"2024-05-09T08:05:24","modified_gmt":"2024-05-09T08:05:24","slug":"analisi-cve-2024-22319-ibm-operational-decision-manager","status":"publish","type":"post","link":"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/","title":{"rendered":"Analisi CVE-2024-22319 in IBM Operational Decision Manager"},"content":{"rendered":"<p>Esplorare le profondit\u00e0 della sicurezza informatica pu\u00f2 rivelare sorprese nascoste e sfide inaspettate, specialmente quando si tratta di sistemi critici come<strong> IBM Operational Decision Manager<\/strong> (<strong>ODM<\/strong>). Un recente sviluppo ha portato alla luce la vulnerabilit\u00e0 <strong>CVE-2024-22319<\/strong>, che presenta rischi significativi per le infrastrutture IT.<\/p>\n\n\n\n<p>Questo articolo si propone di svelare l&#8217;esistenza di questa <a href=\"https:\/\/www.redflare-cyber.com\/en\/conosci-la-minaccia-bad-usb-e-hotplug\/\">minaccia emergente<\/a>, offrendo informazioni e strategie di difesa per proteggere le reti aziendali da potenziali exploit, dimostrando come la conoscenza tecnica sia la chiave per una difesa efficace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IBM Operational Decision Manager<\/h2>\n\n\n\n<p>IBM Operational Decision Manager \u00e8 una <a href=\"https:\/\/www.ibm.com\/it-it\/products\/operational-decision-manager\" target=\"_blank\" rel=\"noreferrer noopener\">piattaforma<\/a> avanzata che consente agli sviluppatori di sistemi di <strong>gestire e automatizzare le decisioni aziendali<\/strong>. Utilizzando regole aziendali e logica decisionale, ODM pu\u00f2 aiutare le organizzazioni a migliorare l&#8217;efficienza operativa e la reattivit\u00e0 alle condizioni di mercato. Tuttavia, come ogni software complesso, non \u00e8 immune da vulnerabilit\u00e0.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-1024x512.png\" alt=\"Logo di IBM su sfondo di un'immagine che rappresenta i sistemi digitali per di IBM Operational Decision Manager.\" class=\"wp-image-2167\" srcset=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-1024x512.png 1024w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-300x150.png 300w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-768x384.png 768w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">CVE-2024-22319<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Che cos&#8217;\u00e8?<\/h3>\n\n\n\n<p>CVE-2024-22319 \u00e8 il nome di una <strong>vulnerabilit\u00e0 di sicurezza<\/strong> <strong>critica<\/strong> che affligge IBM ODM. Se sfruttata, questa vulnerabilit\u00e0 pu\u00f2 consentire a un attaccante di eseguire codice arbitrario sul sistema colpito, potenzialmente compromettendo l&#8217;intera infrastruttura IT di un&#8217;organizzazione.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Come funziona?<\/h3>\n\n\n\n<p>Questo tipo di attacco sfrutta una specifica debolezza nel processo di deserializzazione dei dati da parte di ODM. Gli attaccanti possono inserire oggetti dannosi nei dati serializzati che, quando deserializzati dal sistema, eseguono del codice maligno sul server target.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"IBM Operational Decision Manager\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/mUZed5X3QPA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Imparare a proteggersi: perch\u00e9 \u00e8 fondamentale<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Il potere della conoscenza<\/h3>\n\n\n\n<p>Conoscere le vulnerabilit\u00e0 come CVE-2024-22319 \u00e8 il primo passo per proteggere la propria infrastruttura. Solo attraverso la comprensione delle potenziali minacce e delle tecniche di attacco, i reparti IT e i professionisti in generale possono implementare difese efficaci.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Misure di mitigazione<\/h3>\n\n\n\n<p>Ecco alcune delle strategie di mitigazione che ogni organizzazione dovrebbe considerare:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Aggiornamento del software<\/strong>: assicurarsi di installare tutti gli aggiornamenti e le patch rilasciati da <a href=\"https:\/\/www.ibm.com\/it-it\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a> per ODM.<\/li>\n\n\n\n<li><strong>Monitoraggio delle attivit\u00e0<\/strong>: utilizzare degli strumenti di sicurezza per monitorare continuamente le attivit\u00e0 sospette all&#8217;interno della rete.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.redflare-cyber.com\/en\/formazione-sicurezza-informatica-redflare\/\">Formazione<\/a> e consapevolezza<\/strong>: educare regolarmente il personale IT sulle nuove vulnerabilit\u00e0 e tecniche di attacco.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background\" style=\"background-color:#232323\">Affrontare le minacce alla sicurezza informatica richiede un impegno continuo per l&#8217;apprendimento e l&#8217;aggiornamento. Vulnerabilit\u00e0 come CVE-2024-22319 sottolineano l&#8217;importanza di restare informati e proattivi nella protezione delle nostre infrastrutture IT. E condividere informazioni come queste \u00e8 ci\u00f2 che permette di costruire un ambiente digitale  sicuro e affidabile. Ovviamente, si tratta di un lavoro di squadra!<br><br>Tieni sempre a mente: solo acquisendo conoscenze e comprensione possiamo erigere barriere difensive robuste. Rimani sempre ben informato, pronto e al sicuro.<\/p>","protected":false},"excerpt":{"rendered":"<p>Esplorare le profondit\u00e0 della sicurezza informatica pu\u00f2 rivelare sorprese nascoste e sfide inaspettate, specialmente quando si tratta di sistemi critici come IBM Operational Decision Manager (ODM). Un recente sviluppo ha portato alla luce la vulnerabilit\u00e0 CVE-2024-22319, che presenta rischi significativi per le infrastrutture IT. Questo articolo si propone di svelare l&#8217;esistenza di questa minaccia emergente,&hellip;&nbsp;<a href=\"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Analisi CVE-2024-22319 in IBM Operational Decision Manager<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":2168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[68,43],"tags":[69,64,44,63,77,78,46],"class_list":["post-2165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cve","category-cybersecurity","tag-cve","tag-cyber-attacks","tag-cybersecurity","tag-hacking-tips","tag-ibm","tag-ibm-odm","tag-redflare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analisi CVE-2024-22319 in IBM Operational Decision Manager &#8226; Redflare<\/title>\n<meta name=\"description\" content=\"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proteggi i tuoi sistemi: analisi di CVE-2024-22319 in IBM Operational Decision Manager\" \/>\n<meta property=\"og:description\" content=\"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"Redflare\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-09T08:05:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alessandro Targa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Targa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/\"},\"author\":{\"name\":\"Alessandro Targa\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\"},\"headline\":\"Analisi CVE-2024-22319 in IBM Operational Decision Manager\",\"datePublished\":\"2024-05-09T08:05:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/\"},\"wordCount\":428,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/19-ibm-operational-decision-manager-cover.png\",\"keywords\":[\"CVE\",\"cyber attacks\",\"cybersecurity\",\"hacking tips\",\"IBM\",\"IBM ODM\",\"redflare\"],\"articleSection\":[\"CVE\",\"Cybersecurity\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/\",\"name\":\"Analisi CVE-2024-22319 in IBM Operational Decision Manager &#8226; Redflare\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/19-ibm-operational-decision-manager-cover.png\",\"datePublished\":\"2024-05-09T08:05:24+00:00\",\"description\":\"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/19-ibm-operational-decision-manager-cover.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/19-ibm-operational-decision-manager-cover.png\",\"width\":1200,\"height\":600,\"caption\":\"Sfondo di un'immagine che rappresenta i sistemi digitali per di IBM Operational Decision Manager.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/analisi-cve-2024-22319-ibm-operational-decision-manager\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analisi CVE-2024-22319 in IBM Operational Decision Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"name\":\"Redflare\",\"description\":\"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"alternateName\":\"RF\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.redflare-cyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\",\"name\":\"Redflare\",\"alternateName\":\"RF\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"width\":1080,\"height\":354,\"caption\":\"Redflare\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/artemis-redflare\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\",\"name\":\"Alessandro Targa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"caption\":\"Alessandro Targa\"},\"description\":\"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.\",\"sameAs\":[\"https:\\\/\\\/www.redflare-cyber.com\",\"https:\\\/\\\/youtube.com\\\/@artemis-sec?si=euCSc-IqjvJXpZug\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analisi CVE-2024-22319 in IBM Operational Decision Manager &#8226; Redflare","description":"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/","og_locale":"en_GB","og_type":"article","og_title":"Proteggi i tuoi sistemi: analisi di CVE-2024-22319 in IBM Operational Decision Manager","og_description":"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.","og_url":"https:\/\/www.redflare-cyber.com\/en\/analisi-cve-2024-22319-ibm-operational-decision-manager\/","og_site_name":"Redflare","article_published_time":"2024-05-09T08:05:24+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager.png","type":"image\/png"}],"author":"Alessandro Targa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Targa","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#article","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/"},"author":{"name":"Alessandro Targa","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8"},"headline":"Analisi CVE-2024-22319 in IBM Operational Decision Manager","datePublished":"2024-05-09T08:05:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/"},"wordCount":428,"commentCount":0,"publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-cover.png","keywords":["CVE","cyber attacks","cybersecurity","hacking tips","IBM","IBM ODM","redflare"],"articleSection":["CVE","Cybersecurity"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/","url":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/","name":"Analisi CVE-2024-22319 in IBM Operational Decision Manager &#8226; Redflare","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-cover.png","datePublished":"2024-05-09T08:05:24+00:00","description":"Scopri la vulnerabilit\u00e0 CVE-2024-22319 in IBM Operational Decision Manager e come proteggere le tue infrastrutture.","breadcrumb":{"@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#primaryimage","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-cover.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/05\/19-ibm-operational-decision-manager-cover.png","width":1200,"height":600,"caption":"Sfondo di un'immagine che rappresenta i sistemi digitali per di IBM Operational Decision Manager."},{"@type":"BreadcrumbList","@id":"https:\/\/www.redflare-cyber.com\/analisi-cve-2024-22319-ibm-operational-decision-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.redflare-cyber.com\/"},{"@type":"ListItem","position":2,"name":"Analisi CVE-2024-22319 in IBM Operational Decision Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.redflare-cyber.com\/#website","url":"https:\/\/www.redflare-cyber.com\/","name":"Redflare","description":"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!","publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"alternateName":"RF","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.redflare-cyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.redflare-cyber.com\/#organization","name":"Redflare","alternateName":"RF","url":"https:\/\/www.redflare-cyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","width":1080,"height":354,"caption":"Redflare"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/artemis-redflare\/"]},{"@type":"Person","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8","name":"Alessandro Targa","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","caption":"Alessandro Targa"},"description":"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.","sameAs":["https:\/\/www.redflare-cyber.com","https:\/\/youtube.com\/@artemis-sec?si=euCSc-IqjvJXpZug"]}]}},"_links":{"self":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=2165"}],"version-history":[{"count":5,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2165\/revisions"}],"predecessor-version":[{"id":2207,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2165\/revisions\/2207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media\/2168"}],"wp:attachment":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=2165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=2165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=2165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}