René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
3.9 KiB
JSON

{
"id": "CVE-2015-1974",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2015-06-28T15:59:02.127",
"lastModified": "2016-12-30T20:32:24.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors."
},
{
"lang": "es",
"value": "La herramineta de administraci\u00f3n web en IBM Tivoli Security Directory Server 6.0 anterior a iFix 75, 6.1 anterior a iFix 68, 6.2 anterior a iFix 44, 6.3 anterior a iFix 37, 6.3.1 anterior a iFix 11, y 6.4 anterior a iFix 2 permite a usuarios remotos autenticados evadir las restricciones de comandos a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75438",
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1032734",
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}