2024-07-14 02:06:08 +00:00

208 lines
7.9 KiB
JSON

{
"id": "CVE-2015-0128",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2015-03-18T10:59:04.183",
"lastModified": "2016-11-28T19:15:58.897",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x and 3.x before 3.0.1.6 iFix4, 4.x before 4.0.7 iFix3, and 5.x before 5.0.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-0124."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en IBM Rational Quality Manager 2.x y 3.x en versiones anteriores a 3.0.1.6 iFix4, 4.x en versiones anteriores a 4.0.7 iFix3 y 5.x en versiones anteriores a 5.0.2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada, una vulnerabilidad diferente a CVE-2015-0124."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE0A31B-7A9B-40E6-8648-365D018BA0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A9E54DB-5CB0-4289-B1A7-EA82494A8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B2944B8-BFD1-4184-8E49-69385DD0C0D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "71ECC4C2-BF61-47C7-8435-BE71F1AD0A88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A826A681-A706-4512-B863-1FEABFBCC677"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A79E7EF2-5615-4300-BC0D-865DBDC8B46F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C59EB6D6-2A74-4988-912C-97045647F1ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7EAB61F7-B5B4-47E8-8BFD-02F025358781"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F93D8CAB-0DF0-4A1D-B1A3-78FF892D04AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7204792C-1506-4E95-92CD-098F760FC429"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC134C-08AB-4874-B31D-B08CDF4C2DE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1649F910-F8B9-4AAD-9743-C37B8784A771"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CEDB1D69-FFD1-49DB-9775-B11F21E200F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "443530AE-4F33-4453-826A-8D705DFB7C03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "364E7E8D-D988-4546-9E61-CD2D1A6F0728"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D34C6DE1-40BC-44F3-B106-47E4FA1C4FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0AA277-39E7-441C-9AF2-18848FD4C9D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4938F063-34AF-4C5F-AF43-534C3D052720"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3902033E-35AB-4358-9D07-AF8C59A9621A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "559C7C20-BD07-4E30-A74C-EA35DB2E3F2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B15D55E2-D1C2-4934-8C51-2DA2778ADF7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AC0F2747-175E-4B85-9020-162F019860EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9B31F581-9E7A-4882-A915-FE4784FDC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1E396E-905A-4CE3-8AEB-12BFBE679B2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1186E8-2639-476F-802E-580D98F2E255"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697126",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031885",
"source": "psirt@us.ibm.com"
}
]
}