All the vulnerabilites related to ibm - tivoli_directory_server
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:53
Severity ?
Summary
Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.htmlExploit
cve@mitre.orghttp://secunia.com/advisories/10347Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1010834Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=isg1IR52692Patch, Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg1IR53631Patch, Vendor Advisory
cve@mitre.orghttp://www.oliverkarow.de/research/IDS_directory_traversal.txtExploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.osvdb.org/8367Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/10841Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/16850
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/10347Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1010834Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oliverkarow.de/research/IDS_directory_traversal.txtExploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/8367Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/10841Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/16850
Impacted products
Vendor Product Version
ibm tivoli_directory_server *
ibm tivoli_directory_server 3.2.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7ADDDB0-A0B2-42A7-8235-A46A5A645442",
              "versionEndIncluding": "4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4CBA738-8969-4E5F-B538-1FBFAA432A91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter."
    }
  ],
  "id": "CVE-2004-2526",
  "lastModified": "2024-11-20T23:53:34.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/10347"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1010834"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/8367"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10841"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/10347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1010834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/8367"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16850"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-15 11:06
Modified
2024-11-21 00:07
Severity ?
Summary
IBM Tivoli Directory Server 6.0 allows remote attackers to cause a denial of service (crash) via a crafted LDAP request, as demonstrated by test 2532 in the ProtoVer Sample LDAP test suite.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server 6.0 allows remote attackers to cause a denial of service (crash) via a crafted LDAP request, as demonstrated by test 2532 in the ProtoVer Sample LDAP test suite."
    }
  ],
  "id": "CVE-2006-0717",
  "lastModified": "2024-11-21T00:07:10.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-02-15T11:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002921.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18779"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015653"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16593"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0537"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002921.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18779"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24619"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-22 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5682108-A76B-443A-A172-7F17F54B5983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C3DDD9-9013-414E-B5EB-65F576E12778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCF803A-86AE-4875-ABD8-2DDB44D88F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3E505A-C749-4465-964F-0699DB9C094A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B64779-4C28-4538-8F3C-EE32152AA8AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en Web Admin Tool ien IBM Tivoli Directory Server (TDS) v6.2 antes de v6.2.0.22 y v6.3 antes de v6.3.0.11, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-0740",
  "lastModified": "2024-11-21T01:35:38.353",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-04-22T18:55:03.920",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14508"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16016"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id?1026880"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74610"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-11-09 21:00
Modified
2024-11-21 01:20
Severity ?
Summary
Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68335-7E15-4D94-8384-9292831E152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9F849-EB1F-4A8C-A3F3-9662241037C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en el servidor de proxy en IBM Tivoli Directory Server (TDS) v6.0.0.x anterior a v6.0.0.8-TIV-ITDS-IF0007 y v6.1.x anterior a v6.1.0-TIV-ITDS-FP0005, permite a atacantes remotos llevar a cabo una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una petici\u00f3n no enlazada que ocurre durante una operaci\u00f3n de b\u00fasqueda concreta."
    }
  ],
  "id": "CVE-2010-4217",
  "lastModified": "2024-11-21T01:20:28.483",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-09T21:00:06.210",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1024670"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/68964"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/44604"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2861"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/68964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/44604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2863"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-16 07:42
Modified
2024-11-21 00:02
Severity ?
Summary
slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors.
References
cve@mitre.orghttp://secunia.com/advisories/17484Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1015171Patch
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=enPatch, Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg21222159Patch, Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only
cve@mitre.orghttp://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only
cve@mitre.orghttp://www.kb.cert.org/vuls/id/194753US Government Resource
cve@mitre.orghttp://www.osvdb.org/20672Patch
cve@mitre.orghttp://www.securityfocus.com/bid/15367Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2356Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/22989
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17484Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015171Patch
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=enPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg21222159Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/194753US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/20672Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15367Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2356Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/22989
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors."
    }
  ],
  "id": "CVE-2005-3567",
  "lastModified": "2024-11-21T00:02:11.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-16T07:42:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17484"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015171"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02697\u0026apar=only"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02714\u0026apar=only"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/194753"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/20672"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15367"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2356"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02697\u0026apar=only"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02714\u0026apar=only"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/194753"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/20672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15367"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2356"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:58
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 does not properly handle the simultaneous changing of multiple passwords, which makes it easier for remote authenticated users to cause a denial of service (DB2 daemon deadlock) by making password changes that trigger updates to a DB2 password-history table.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 does not properly handle the simultaneous changing of multiple passwords, which makes it easier for remote authenticated users to cause a denial of service (DB2 daemon deadlock) by making password changes that trigger updates to a DB2 password-history table."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v5.2 anterior v5.2.0.5-ITV-ITDS-LA0007 no controla correctamente el cambio simult\u00e1neo de m\u00faltiples contrase\u00f1as, lo que hace m\u00e1s f\u00e1cil para los usuarios remotos autenticados causar una denegaci\u00f3n de servicio (bloqueo del demonio de DB2) haciendo los cambios de contrase\u00f1a que desencadenan cambios a una tabla de DB2 del historial de contrase\u00f1as."
    }
  ],
  "id": "CVE-2008-7289",
  "lastModified": "2024-11-21T00:58:45.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.013",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09667"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-08 18:30
Modified
2024-11-21 01:06
Severity ?
Summary
Unspecified vulnerability in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 6.0
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en IBM Tivoli Directory Server (TDS) v6.0 para Linux permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante vectores no especificados, como se ha demostrado por cierto m\u00f3dulo en VulnDisco Pack Professional 8.11. NOTA: hasta el 3-3-2009, esta divulgaci\u00f3n no ten\u00eda informaci\u00f3n para su puesta en pr\u00e1ctica. En cualquier caso, como el autor de VulnDisco Pack es un investigador reputado, se ha asignado un identificador CVE con fines de seguimiento."
    }
  ],
  "id": "CVE-2009-3090",
  "lastModified": "2024-11-21T01:06:30.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-08T18:30:00.547",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-28 15:59
Modified
2024-11-21 02:26
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Security Directory Server 6.0 anterior a iFix 75, 6.1 anterior a iFix 68, 6.2 anterior a iFix 44, 6.3 anterior a iFix 37, 6.3.1 anterior a iFix 11, y 6.4 anterior a iFix 2 permite a atacantes remotos obtener informaci\u00f3n sensible de registros de error a trav\u00e9s de una solicitud POST manipulada."
    }
  ],
  "id": "CVE-2015-1972",
  "lastModified": "2024-11-21T02:26:29.913",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-28T15:59:01.203",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75441"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:11
Severity ?
Summary
Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument."
    },
    {
      "lang": "es",
      "value": "P\u00e9rdida de memoria en la funci\u00f3n ldap_explode_dn en IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.61 (tambi\u00e9n conocido como v6.0.0.8-ITV-ITDS-IF0003) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un argumento de cadena vac\u00eda."
    }
  ],
  "id": "CVE-2009-5072",
  "lastModified": "2024-11-21T01:11:07.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.093",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11407"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-08 18:30
Modified
2024-11-21 01:06
Severity ?
Summary
Heap-based buffer overflow in ibmdiradm in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to have an unspecified impact via unknown vectors that trigger heap corruption, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
Impacted products
Vendor Product Version
linux linux_kernel *
ibm tivoli_directory_server 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in ibmdiradm in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to have an unspecified impact via unknown vectors that trigger heap corruption, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en ibmdiradm de IBM Tivoli Directory Server (TDS) v6.0 en Linux permite a atacantes remotos tener un impacto sin especificar a trav\u00e9s de vectores de ataque desconocidos que provocan una corrupci\u00f3n de la memoria din\u00e1mica, tal como se ha demostrado por ciertos m\u00f3dulos en VulnDisco Pack Professional 8.11. NOTA: a fecha de 03/09/2009, esta informaci\u00f3n no es explotable. Si embargo, como el autor de VulnDisco Pack es un investigador fiable se ha asignado un identificador CVE a est\u00e1 informaci\u00f3n con prop\u00f3sitos de seguimiento."
    }
  ],
  "id": "CVE-2009-3088",
  "lastModified": "2024-11-21T01:06:30.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-08T18:30:00.500",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-08 22:59
Modified
2024-11-21 02:26
Summary
IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BCC2A7-717C-48ED-A18D-D53DB5C5494C",
              "versionEndIncluding": "6.3.1.15",
              "versionStartIncluding": "6.3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED8B510-A1AD-4D44-A1A6-BFB598A7B01D",
              "versionEndIncluding": "6.4.0.6",
              "versionStartIncluding": "6.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "373090C2-BA5E-4BAA-AFB0-A8177C3A0D91",
              "versionEndIncluding": "6.0.0.77",
              "versionStartIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "613173B1-55AA-4847-8874-A8A3C7478B7A",
              "versionEndIncluding": "6.1.0.72",
              "versionStartIncluding": "6.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B901486-F601-4CB5-827A-88EF84D62FAC",
              "versionEndIncluding": "6.2.0.48",
              "versionStartIncluding": "6.2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CE5FEE-59BA-4618-9E6B-A85C99E6C31B",
              "versionEndIncluding": "6.3.0.41",
              "versionStartIncluding": "6.3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash."
    },
    {
      "lang": "es",
      "value": "IBM Security Directory Server podr\u00eda permitir a un usuario autenticado ejecutar comandos en la herramienta de administraci\u00f3n web que causar\u00eda la ca\u00edda de la herramienta."
    }
  ],
  "id": "CVE-2015-1976",
  "lastModified": "2024-11-21T02:26:30.250",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-08T22:59:00.150",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21980585"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/90526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21980585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/90526"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-28 15:59
Modified
2024-11-21 02:26
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en IBM Tivoli Security Directory Server 6.0 anterior a iFix 75, 6.1 anterior a iFix 68, 6.2 anterior a iFix 44, 6.3 anterior a iFix 37, 6.3.1 anterior a iFix 11, y 6.4 anterior a iFix 2 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTMl a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2015-1978",
  "lastModified": "2024-11-21T02:26:30.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-06-28T15:59:02.923",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75435"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-28 15:59
Modified
2024-11-21 02:26
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Security Directory Server 6.0 en versiones anteriores a iFix 75, 6.1 en versiones anteriores a iFix 68, 6.2 en versiones anteriores a iFix 44, 6.3 en versiones anteriores a iFix 37, 6.3.1 en versiones anteriores a iFix 11 y 6.4 en versiones anteriores a iFix 2 no previene correctamente el almacenamiento en cach\u00e9 de documentos recuperados en sesiones SSL, lo que permite a atacantes fisicamente pr\u00f3ximos obtener informaci\u00f3n sensible aprovechando un puesto de trabajo desatendido."
    }
  ],
  "id": "CVE-2015-2019",
  "lastModified": "2024-11-21T02:26:36.353",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-28T15:59:03.843",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75437"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-17"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-22 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F4E54D-DA8B-46C1-A627-C8D960E1B719",
              "versionEndIncluding": "6.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4CBA738-8969-4E5F-B538-1FBFAA432A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13318848-11BC-4568-A3AF-1D1C89BF8FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C50ACBE-6F59-4985-BFA3-93CAD8E40B6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D74AC3D-DFCD-4A3A-9446-7C13C00E93A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43ECBF2-8D39-469F-8D45-B2FA44B3A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "18ABDC8A-118C-4A35-A396-1020A9469D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "38204AD1-BF0E-4521-9EE6-66214B4A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "218DD29F-18C9-489D-9273-4705BFCDE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7165C049-258B-425D-B36B-152BBF3F8727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8B3BE0-2515-4CB1-B124-5462703CD32B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n por defecto de TLS en Tivoli Directory Server (TDS) v6.3 y anteriores, soporta los cifrados (1) NULL-MD5 y (2) NULL-SHA, lo que permite a atacantes remotos lanzar comunicaciones no cifradas a trav\u00e9s de TLS Handshake Protocol."
    }
  ],
  "id": "CVE-2012-0726",
  "lastModified": "2024-11-21T01:35:36.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-22T18:55:03.857",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15761"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16035"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16036"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/53043"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id?1026939"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74303"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-27 16:55
Modified
2024-11-21 01:59
Severity ?
Summary
IBM GSKit 7.x before 7.0.4.48 and 8.x before 8.0.50.16, as used in IBM Security Directory Server (ISDS) and Tivoli Directory Server (TDS), allows remote attackers to cause a denial of service (application crash or hang) via a malformed X.509 certificate chain.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF70503-E817-4C61-9D3C-DC1DD686E26F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35B7413-2886-47B7-B24B-0A110EC5235F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD561AD-2421-4AA6-B3C5-6536F6933526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E509BA-4B47-4EDE-86DC-2E666D2D74E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "93634D15-AB7C-412E-8F16-93D44FC9FA20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:8.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AB7743-1AA2-4726-B96F-D98C2815BA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AF8C4-B43B-48D7-8A73-A670E90E20C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF51C894-8EE2-46CA-B625-32EC718C3DE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM GSKit 7.x before 7.0.4.48 and 8.x before 8.0.50.16, as used in IBM Security Directory Server (ISDS) and Tivoli Directory Server (TDS), allows remote attackers to cause a denial of service (application crash or hang) via a malformed X.509 certificate chain."
    },
    {
      "lang": "es",
      "value": "IBM GSKit 7.x anterior a la versi\u00f3n 7.0.4.48 y 8.x anterior a 8.0.50.16, tal como se usa en IBM Security Directory Server (ISDS) y Tivoli Directory Server (TDS), permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n o cuelgue) a trav\u00e9s de una cadena de certificados."
    }
  ],
  "id": "CVE-2013-6747",
  "lastModified": "2024-11-21T01:59:39.440",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-27T16:55:04.287",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://osvdb.org/102556"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/56698"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/56699"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id/1029687"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56699"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89863"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-28 15:59
Modified
2024-11-21 02:26
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Security Directory Server 6.0 anterior a iFix 75, 6.1 anterior a iFix 68, 6.2 anterior a iFix 44, 6.3 anterior a iFix 37, 6.3.1 anterior a iFix 11, y 6.4 anterior a iFix 2 no restringe correctamente los ficheros codificados, lo que permite a usuarios locales obtener informaci\u00f3n sensible o posiblemente tener otro impacto no especificado a trav\u00e9s de una acci\u00f3n (1) de descarga o (2) subida."
    }
  ],
  "id": "CVE-2015-1959",
  "lastModified": "2024-11-21T02:26:28.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-28T15:59:00.093",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/75442"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/75442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1032734"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-03-25 01:59
Modified
2024-11-21 02:22
Severity ?
Summary
GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
References
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-1006.html
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-1007.html
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-1020.html
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-1021.html
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-1091.html
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21698703Patch, Vendor Advisory
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21883640Vendor Advisory
psirt@us.ibm.comhttp://www.securityfocus.com/bid/73326
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1006.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1007.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1020.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1021.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1091.html
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21698703Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21883640Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/73326
Impacted products
Vendor Product Version
ibm tivoli_directory_server *
ibm tivoli_directory_server 6.1.0
ibm tivoli_directory_server 6.1.0.0
ibm tivoli_directory_server 6.1.0.1
ibm tivoli_directory_server 6.1.0.2
ibm tivoli_directory_server 6.1.0.3
ibm tivoli_directory_server 6.1.0.4
ibm tivoli_directory_server 6.1.0.5
ibm tivoli_directory_server 6.1.0.6
ibm tivoli_directory_server 6.1.0.7
ibm tivoli_directory_server 6.1.0.8
ibm tivoli_directory_server 6.1.0.9
ibm tivoli_directory_server 6.1.0.10
ibm tivoli_directory_server 6.1.0.11
ibm tivoli_directory_server 6.1.0.12
ibm tivoli_directory_server 6.1.0.13
ibm tivoli_directory_server 6.1.0.14
ibm tivoli_directory_server 6.1.0.15
ibm tivoli_directory_server 6.1.0.17
ibm tivoli_directory_server 6.1.0.18
ibm tivoli_directory_server 6.1.0.19
ibm tivoli_directory_server 6.1.0.20
ibm tivoli_directory_server 6.1.0.21
ibm tivoli_directory_server 6.1.0.22
ibm tivoli_directory_server 6.1.0.23
ibm tivoli_directory_server 6.1.0.24
ibm tivoli_directory_server 6.1.0.25
ibm tivoli_directory_server 6.1.0.26
ibm tivoli_directory_server 6.1.0.27
ibm tivoli_directory_server 6.1.0.28
ibm tivoli_directory_server 6.1.0.29
ibm tivoli_directory_server 6.1.0.30
ibm tivoli_directory_server 6.1.0.31
ibm tivoli_directory_server 6.1.0.32
ibm tivoli_directory_server 6.1.0.33
ibm tivoli_directory_server 6.1.0.34
ibm tivoli_directory_server 6.1.0.35
ibm tivoli_directory_server 6.1.0.36
ibm tivoli_directory_server 6.1.0.37
ibm tivoli_directory_server 6.1.0.38
ibm tivoli_directory_server 6.1.0.39
ibm tivoli_directory_server 6.1.0.40
ibm tivoli_directory_server 6.1.0.41
ibm tivoli_directory_server 6.1.0.42
ibm tivoli_directory_server 6.1.0.43
ibm tivoli_directory_server 6.1.0.44
ibm tivoli_directory_server 6.1.0.45
ibm tivoli_directory_server 6.1.0.46
ibm tivoli_directory_server 6.1.0.47
ibm tivoli_directory_server 6.1.0.48
ibm tivoli_directory_server 6.1.0.49
ibm tivoli_directory_server 6.1.0.50
ibm tivoli_directory_server 6.1.0.51
ibm tivoli_directory_server 6.1.0.52
ibm tivoli_directory_server 6.1.0.53
ibm tivoli_directory_server 6.1.0.54
ibm tivoli_directory_server 6.1.0.55
ibm tivoli_directory_server 6.1.0.56
ibm tivoli_directory_server 6.1.0.57
ibm tivoli_directory_server 6.1.0.58
ibm tivoli_directory_server 6.1.0.59
ibm tivoli_directory_server 6.1.0.60
ibm tivoli_directory_server 6.1.0.61
ibm tivoli_directory_server 6.1.0.62
ibm tivoli_directory_server 6.1.0.63
ibm tivoli_directory_server 6.1.0.64
ibm tivoli_directory_server 6.1.0.65
ibm tivoli_directory_server 6.1.0.66
ibm tivoli_directory_server 6.2.0.0
ibm tivoli_directory_server 6.2.0.1
ibm tivoli_directory_server 6.2.0.2
ibm tivoli_directory_server 6.2.0.3
ibm tivoli_directory_server 6.2.0.4
ibm tivoli_directory_server 6.2.0.5
ibm tivoli_directory_server 6.2.0.6
ibm tivoli_directory_server 6.2.0.7
ibm tivoli_directory_server 6.2.0.8
ibm tivoli_directory_server 6.2.0.10
ibm tivoli_directory_server 6.2.0.11
ibm tivoli_directory_server 6.2.0.12
ibm tivoli_directory_server 6.2.0.13
ibm tivoli_directory_server 6.2.0.14
ibm tivoli_directory_server 6.2.0.15
ibm tivoli_directory_server 6.2.0.19
ibm tivoli_directory_server 6.2.0.20
ibm tivoli_directory_server 6.2.0.21
ibm tivoli_directory_server 6.2.0.22
ibm tivoli_directory_server 6.2.0.23
ibm tivoli_directory_server 6.2.0.24
ibm tivoli_directory_server 6.2.0.25
ibm tivoli_directory_server 6.2.0.26
ibm tivoli_directory_server 6.2.0.27
ibm tivoli_directory_server 6.2.0.29
ibm tivoli_directory_server 6.2.0.30
ibm tivoli_directory_server 6.2.0.31
ibm tivoli_directory_server 6.2.0.32
ibm tivoli_directory_server 6.2.0.33
ibm tivoli_directory_server 6.2.0.34
ibm tivoli_directory_server 6.2.0.35
ibm tivoli_directory_server 6.2.0.36
ibm tivoli_directory_server 6.2.0.37
ibm tivoli_directory_server 6.2.0.38
ibm tivoli_directory_server 6.2.0.39
ibm tivoli_directory_server 6.2.0.40
ibm tivoli_directory_server 6.2.0.41
ibm tivoli_directory_server 6.2.0.42
ibm tivoli_directory_server 6.3.0.0
ibm tivoli_directory_server 6.3.0.1
ibm tivoli_directory_server 6.3.0.2
ibm tivoli_directory_server 6.3.0.8
ibm tivoli_directory_server 6.3.0.9
ibm tivoli_directory_server 6.3.0.10
ibm tivoli_directory_server 6.3.0.11
ibm tivoli_directory_server 6.3.0.12
ibm tivoli_directory_server 6.3.0.14
ibm tivoli_directory_server 6.3.0.15
ibm tivoli_directory_server 6.3.0.17
ibm tivoli_directory_server 6.3.0.18
ibm tivoli_directory_server 6.3.0.19
ibm tivoli_directory_server 6.3.0.21
ibm tivoli_directory_server 6.3.0.22
ibm tivoli_directory_server 6.3.0.23
ibm tivoli_directory_server 6.3.0.24
ibm tivoli_directory_server 6.3.0.25
ibm tivoli_directory_server 6.3.0.26
ibm tivoli_directory_server 6.3.0.27
ibm tivoli_directory_server 6.3.0.28
ibm tivoli_directory_server 6.3.0.29
ibm tivoli_directory_server 6.3.0.30
ibm tivoli_directory_server 6.3.0.31
ibm tivoli_directory_server 6.3.0.32
ibm tivoli_directory_server 6.3.0.33
ibm tivoli_directory_server 6.3.0.34
ibm tivoli_directory_server 6.3.0.35
ibm tivoli_directory_server 6.3.1.0
ibm tivoli_directory_server 6.3.1.5
ibm tivoli_directory_server 6.3.1.6
ibm tivoli_directory_server 6.3.1.7
ibm tivoli_directory_server 6.3.1.8
ibm tivoli_directory_server 6.3.1.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F13D54-ED0A-4941-85E1-8C2BCF366891",
              "versionEndIncluding": "6.0.0.73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDBA9D2-E683-431A-B06C-5CCA55E44EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "86556AFA-F4F5-4C29-B59D-DC5281375E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E16D75E-7678-48AF-AA2D-33C167ACC99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBB97A26-E8A9-418C-87C9-F4837BF6680A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3922010D-4867-402C-9EC5-98FDEB281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D92F4-51B0-4DC0-B872-984AD0A6008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B93E759-1B76-421D-9684-F6FF77A99E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "344605B3-15C9-4E36-A22B-7EBC1207A03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15D60CA-8B3C-48D7-A860-1B72BCA14CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD03B74B-E234-4757-8D98-896DEA4CED7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF9CDD0-3F78-4489-A18D-40A1FAF705F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF6D03-9A58-477D-B5D0-030A373A58AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7636BE-22BB-44C3-B303-9780E2A24487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4E6E83-914D-467F-9EEA-56669B95CCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BBCED9-4260-40DC-A9A6-40CDB09BA92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D297D508-ACC2-41E7-B3F5-5AEDFE3E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD3BA3E-E015-4CB7-B686-19F45F8221C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F615EC-7530-468D-B62E-B07A1FE0431B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E278A8E-D7B6-450C-92D6-9955B22E18C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D85F4-1019-419D-8769-B1636385384C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D3F8DB-C145-403F-92DE-CF4D5DC83177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE3E56E-95DC-4706-9FBE-622FFA9C8092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "684BD112-7763-4901-973C-D2ABB10CCE3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "311FA0A0-FACB-4A20-AA75-35EF1FF6F0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8CA71-D7A8-4841-A895-E009F3552359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43ECBF2-8D39-469F-8D45-B2FA44B3A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "18ABDC8A-118C-4A35-A396-1020A9469D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "38204AD1-BF0E-4521-9EE6-66214B4A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "218DD29F-18C9-489D-9273-4705BFCDE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "3947B542-1356-4645-A792-E27DB2C07DCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "39A69967-1505-45AB-B70B-9E9C15AB6798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AE0B38-8249-4959-B031-996EC4EE92FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "0652BE9E-5EC8-436A-A88E-4707F36C5893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2541DAF-6093-4411-98C6-A41F49D224D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC763F0-71C3-494C-AD5D-A3389D643328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C19DFC0-14CC-456D-AC84-D9F634F9734F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2BE5F0-CEEB-480A-9B80-D08142659C24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "540FD770-3493-4C44-A3B4-2AB307E0B472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F359B1-7984-4BB8-9408-440745AFBF4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "472B5989-E033-449C-AB90-E24FE7F99125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B938E8-26C7-425C-AA54-081FF3EC00F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "202262F1-6CB8-4235-B5F0-00FDC6FB614D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF29B53-180C-4B20-90D5-480C467F5746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B7FD9C-FEA9-4001-BD48-10B02B38989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55B351A-E773-42F0-A7EA-F1874F7BCCCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "57FB18BD-4C72-436C-85CB-06037E2CFC1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC0FD9F-A137-4AD1-8F77-58E822070D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CB6BE6-C851-4C31-A016-CCD4937277D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260260B-B69E-4B59-A0D1-1F71B92ABDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08631DE-72C4-462B-9763-41783EA8963C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50315494-8C1B-436B-8E24-8B8CA565FB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2759F8BC-8400-4AB1-81DD-51BD69BB720E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEB330D-5FC6-424B-85EF-06A56329FFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DE5E95-BA4A-42A2-B376-373331D9934E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87492D7-D0C6-4E4A-87B3-F44BC3149101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8B3BE0-2515-4CB1-B124-5462703CD32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B735E0-B531-4684-8BF5-0540F5B8FBEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "677E05F0-F000-4C5F-83D7-7E2ED5CCB0A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E923364-6895-4B51-9C3F-B150EC6A541D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F288406-D938-415D-AD92-F8AFC7219691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BBE891-2D1F-485D-A509-1A851CE83111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6771D20-C32B-4324-89E6-387724922D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8A4729-46F8-44BE-B31C-FFB761C17D89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "C87A9397-6290-4D19-8A80-0D439B5915A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60F206-4C09-4E06-98F5-8B4C85714803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F293FC-C7C7-41A3-A5B0-5203B000D41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC09987-98C8-4395-871F-E45C9745ACD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB52381-38CB-4B68-9515-019FE318CA92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F3261B-9595-493A-9CFB-F3C049C570C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD872AF-0478-457D-87DA-FC125378411F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD471E9-2DD0-4364-ABC2-9CFC0747A477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A40152-B83F-454A-A94E-F694512F56FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE73B82-CC1C-4F5D-A8D3-7AD151665B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "5365E6BD-067B-46F8-A2F6-B46801B55FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7EA7C3-A9AE-4C55-88FC-06DA3A03766A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D872267B-B01D-4723-A522-8CDF684CB980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2234E088-31ED-4BBF-94C5-131E3B0CB994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCF803A-86AE-4875-ABD8-2DDB44D88F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3E505A-C749-4465-964F-0699DB9C094A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B64779-4C28-4538-8F3C-EE32152AA8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A389475F-F043-40B7-894E-C8338EF86C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD77105-5410-474A-B42F-5CC69CB5FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "869DB569-F140-4AD9-B230-2A5752BAEA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5545F04-B8D1-48FB-BDAD-27E1260AEB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A2FA81-F8D6-4255-8F55-A0B746D84691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C950A3E7-7CD2-4BB2-89B4-C708735371A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC98E9A-E879-4A28-93E9-0977F7B4C860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF81D730-514C-4A9A-8683-54A1AD4E8F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6369ACB4-475E-4349-A6C3-7B718660F65D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3EEB0C-7CFC-4CB3-A177-6A59BD4A68C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B3EE13-1C01-49DD-A642-C061783D958B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30DA3DA-82E3-4E8D-9077-66AE9B5A374F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E70DE3A2-A6D7-4493-9182-1C0B7FBDF90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "403A84D2-4D3E-483B-A14A-AF1CEF06B9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B3CD94-82B3-4265-9A9E-2F008F7051E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BFB392-F7EE-4448-A3AA-65E3269C1DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A621A28-D193-4C1B-8008-422DCE5229ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "378EB8A4-7F3A-463A-8D12-83800BC0C0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEFC8686-795C-455B-B411-BD56E91683CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "59568EE3-3365-4864-BAAB-CE56DE2420ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3A04A-B6F9-4C69-8A4D-4415D10C73C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5DAFE9-F022-4240-AFDA-5B44E303F889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6406B436-A4C1-4936-AF73-C62DC663588A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "64144623-32F7-4FD7-AE40-875078EF6954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0BCFF6A-7A7F-4DB7-B2AC-54A35B4F006D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "94CFDA59-051E-46C0-814A-CDE82C29B3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1C266D-606B-47A3-898F-01D794F591E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the \"FREAK\" issue, a different vulnerability than CVE-2015-0204."
    },
    {
      "lang": "es",
      "value": "GSKit en IBM Tivoli Directory Server (ITDS) 6.0 anterior a 6.0.0.73-ISS-ITDS-IF0073, 6.1 anterior a 6.1.0.66-ISS-ITDS-IF0066, 6.2 anterior a 6.2.0.42-ISS-ITDS-IF0042, y 6.3 anterior a 6.3.0.35-ISS-ITDS-IF0035 e IBM Security Directory Server (ISDS) 6.3.1 anterior a 6.3.1.9-ISS-ISDS-IF0009 no restringe correctamente las transiciones de estados de TLS, lo que facilita a atacantes remotos realizar ataques de degradaci\u00f3n de cifrado sobre los cifrados EXPORT_RSA a trav\u00e9s de trafico de TLS manipulado, relacionado con el problema \u0027FREAK\u0027, una vulnerabilidad diferente a CVE-2015-0204."
    }
  ],
  "id": "CVE-2015-0138",
  "lastModified": "2024-11-21T02:22:26.253",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-25T01:59:17.923",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/73326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/73326"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:27
Severity ?
Summary
The LDAP_ADD implementation in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0009 stores a cleartext SHA password in the change log, which might allow local users to obtain sensitive information by reading this log.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The LDAP_ADD implementation in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0009 stores a cleartext SHA password in the change log, which might allow local users to obtain sensitive information by reading this log."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n LDAP_ADD en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5TIV-ITDS-IF0009 almacena una contrase\u00f1a SHA sin cifrar en el registro de cambios, lo que podr\u00eda permitir a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de este registro."
    }
  ],
  "id": "CVE-2011-1822",
  "lastModified": "2024-11-21T01:27:06.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:02.750",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-11-09 21:00
Modified
2024-11-21 01:20
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 does not properly handle invalid buffer references in LDAP BER requests, which might allow remote attackers to cause a denial of service (daemon crash) via vectors involving a buffer that has a memory address near the maximum possible address.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 does not properly handle invalid buffer references in LDAP BER requests, which might allow remote attackers to cause a denial of service (daemon crash) via vectors involving a buffer that has a memory address near the maximum possible address."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0.0.x anterior a v6.0.0.8-TIV-ITDS-IF0007 no maneja adecuadamente las referencias inv\u00e1lidas de b\u00fafer en peticiones LDAP BER, lo que podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de vectores involucrados con un b\u00fafer que tiene una direcci\u00f3n de memoria pr\u00f3xima a la direcci\u00f3n m\u00e1xima psible."
    }
  ],
  "id": "CVE-2010-4216",
  "lastModified": "2024-11-21T01:20:28.337",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-09T21:00:06.180",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42116"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/44604"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2863"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/44604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:58
Severity ?
Summary
Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en la funci\u00f3n API ldap_explode_rdn en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-LA0007) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria) haciendo muchas llamadas de funci\u00f3n."
    }
  ],
  "id": "CVE-2008-7290",
  "lastModified": "2024-11-21T00:58:45.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09680"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:40
Severity ?
Summary
Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de doble liberaci\u00f3n en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-LA0005 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ABEND) a trav\u00e9s de las operaciones de b\u00fasqueda que provocan las llamadas recursivas filter_free."
    }
  ],
  "id": "CVE-2007-6743",
  "lastModified": "2024-11-21T00:40:54.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:00.857",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07174"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-07-17 20:55
Modified
2024-11-21 01:28
Severity ?
Summary
The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5682108-A76B-443A-A172-7F17F54B5983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation."
    },
    {
      "lang": "es",
      "value": "En la herramienta de administraci\u00f3n Web de IBM Tivoli Directory Server (TDS) v6.2 y anteriores a 6.2.0.3-TIV-ITDS-IF0004, La p\u00e1gina de inicio de sesi\u00f3n IDSWebApp, no tiene un atributo de autocompletar para los campos de autenticaci\u00f3n, lo que hace m\u00e1s f\u00e1cil para los atacantes remotos obtener acceso mediante el aprovechamiento de una estaci\u00f3n de trabajo sin supervisi\u00f3n."
    }
  ],
  "id": "CVE-2011-2759",
  "lastModified": "2024-11-21T01:28:54.753",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-07-17T20:55:02.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:11
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.59 (tambi\u00e9n conocido como v6.0.0.8-ITV-ITDS-IF0001) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (bucle infinito y el demonio de bloqueo) mediante la adici\u00f3n de un grupo anidado que contiene el Distinguished Name (DN) de su entrada padre."
    }
  ],
  "id": "CVE-2009-5073",
  "lastModified": "2024-11-21T01:11:07.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.170",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO10802"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO10802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:27
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4
microsoft windows *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v5.2 antrior a 5.2.0.5-ITV-ITDS-IF0010 en Windows permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (bloqueo del demonio) a trav\u00e9s de una b\u00fasqueda cn=changelog."
    }
  ],
  "id": "CVE-2011-1821",
  "lastModified": "2024-11-21T01:27:06.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:02.717",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13000"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:21
Severity ?
Summary
Use-after-free vulnerability in the proxy-server implementation in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.65 (aka 6.0.0.8-TIV-ITDS-IF0007) and 6.3 before 6.3.0.1 (aka 6.3.0.0-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (daemon crash) via a paged search that is interrupted by an LDAP Unbind operation.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68335-7E15-4D94-8384-9292831E152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9F849-EB1F-4A8C-A3F3-9662241037C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in the proxy-server implementation in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.65 (aka 6.0.0.8-TIV-ITDS-IF0007) and 6.3 before 6.3.0.1 (aka 6.3.0.0-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (daemon crash) via a paged search that is interrupted by an LDAP Unbind operation."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de uso despu\u00e9s de la liberaci\u00f3n en la aplicaci\u00f3n proxy-server en IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.65 (tambi\u00e9n conocido como v6.0.0.8-ITV -ITDS-IF0007) y v6.3 anterior a v6.3.0.1 (tambi\u00e9n conocido como 6.3.0.0-ITV-ITDS-IF0001 ) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una b\u00fasqueda paginada que es interrumpida por una operaci\u00f3n de desasignaci\u00f3n LDAP."
    }
  ],
  "id": "CVE-2010-4789",
  "lastModified": "2024-11-21T01:21:46.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13364"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13451"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-08 10:26
Modified
2024-11-21 01:38
Severity ?
Summary
IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, does not properly validate data during execution of a protection mechanism against the Vaudenay SSL CBC timing attack, which allows remote attackers to cause a denial of service (application crash) via crafted values in the TLS Record Layer, a different vulnerability than CVE-2012-2333.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDD46A9C-9DB2-4B61-BCEA-DC5AB03DCD7E",
              "versionEndIncluding": "8.0.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD561AD-2421-4AA6-B3C5-6536F6933526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E509BA-4B47-4EDE-86DC-2E666D2D74E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0651DE7C-B8EB-4214-981B-561256C5473A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "871E249E-CB31-46A4-9E4F-274C6055C33A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, does not properly validate data during execution of a protection mechanism against the Vaudenay SSL CBC timing attack, which allows remote attackers to cause a denial of service (application crash) via crafted values in the TLS Record Layer, a different vulnerability than CVE-2012-2333."
    },
    {
      "lang": "es",
      "value": "IBM Global Security Kit (tambi\u00e9n conocido como GSKit) anterior a v8.0.14.22, cuando es usado en IBM Directory Server Rational de IBM Tivoli Directory Server y otros productos, no valida correctamente los datos durante la ejecuci\u00f3n de un mecanismo de protecci\u00f3n contra el ataque (Vaudenay SSL CBC timing), que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de  valores manipulados de la capa de registro TLS, una vulnerabilidad diferente a CVE-2012-2333."
    }
  ],
  "id": "CVE-2012-2191",
  "lastModified": "2024-11-21T01:38:40.743",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-08T10:26:18.767",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/51279"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/54743"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/54743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:27
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log.
References
cve@mitre.orghttp://secunia.com/advisories/44184Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1025358
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14023
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14025
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14028
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14043
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14044
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg21496086
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029659Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029660Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029661Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029663Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029672Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/66712
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44184Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025358
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14023
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14025
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14028
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14043
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14044
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg21496086
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029659Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029660Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029661Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029663Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029672Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66712
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4
ibm tivoli_directory_server 6.0
ibm tivoli_directory_server 6.0.0.0
ibm tivoli_directory_server 6.0.0.1
ibm tivoli_directory_server 6.0.0.7
ibm tivoli_directory_server 6.0.0.8
ibm tivoli_directory_server 6.0.0.14
ibm tivoli_directory_server 6.0.0.19
ibm tivoli_directory_server 6.0.0.33
ibm tivoli_directory_server 6.0.0.41
ibm tivoli_directory_server 6.0.0.45
ibm tivoli_directory_server 6.0.0.52
ibm tivoli_directory_server 6.0.0.53
ibm tivoli_directory_server 6.0.0.54
ibm tivoli_directory_server 6.0.0.55
ibm tivoli_directory_server 6.0.0.56
ibm tivoli_directory_server 6.0.0.57
ibm tivoli_directory_server 6.0.0.58
ibm tivoli_directory_server 6.0.0.59
ibm tivoli_directory_server 6.0.0.60
ibm tivoli_directory_server 6.0.0.61
ibm tivoli_directory_server 6.0.0.62
ibm tivoli_directory_server 6.0.0.63
ibm tivoli_directory_server 6.0.0.64
ibm tivoli_directory_server 6.0.0.65
ibm tivoli_directory_server 6.0.0.66
ibm tivoli_directory_server 6.1.0.0
ibm tivoli_directory_server 6.1.0.1
ibm tivoli_directory_server 6.1.0.2
ibm tivoli_directory_server 6.1.0.3
ibm tivoli_directory_server 6.1.0.4
ibm tivoli_directory_server 6.1.0.5
ibm tivoli_directory_server 6.1.0.6
ibm tivoli_directory_server 6.1.0.7
ibm tivoli_directory_server 6.1.0.8
ibm tivoli_directory_server 6.1.0.9
ibm tivoli_directory_server 6.1.0.10
ibm tivoli_directory_server 6.1.0.11
ibm tivoli_directory_server 6.1.0.12
ibm tivoli_directory_server 6.1.0.13
ibm tivoli_directory_server 6.1.0.14
ibm tivoli_directory_server 6.1.0.15
ibm tivoli_directory_server 6.1.0.17
ibm tivoli_directory_server 6.1.0.18
ibm tivoli_directory_server 6.1.0.19
ibm tivoli_directory_server 6.1.0.20
ibm tivoli_directory_server 6.1.0.21
ibm tivoli_directory_server 6.1.0.22
ibm tivoli_directory_server 6.1.0.23
ibm tivoli_directory_server 6.1.0.24
ibm tivoli_directory_server 6.1.0.25
ibm tivoli_directory_server 6.1.0.26
ibm tivoli_directory_server 6.1.0.27
ibm tivoli_directory_server 6.1.0.28
ibm tivoli_directory_server 6.1.0.29
ibm tivoli_directory_server 6.1.0.30
ibm tivoli_directory_server 6.1.0.31
ibm tivoli_directory_server 6.1.0.32
ibm tivoli_directory_server 6.1.0.33
ibm tivoli_directory_server 6.1.0.34
ibm tivoli_directory_server 6.1.0.35
ibm tivoli_directory_server 6.1.0.36
ibm tivoli_directory_server 6.1.0.37
ibm tivoli_directory_server 6.1.0.38
ibm tivoli_directory_server 6.1.0.39
ibm tivoli_directory_server 6.2.0.0
ibm tivoli_directory_server 6.2.0.1
ibm tivoli_directory_server 6.2.0.2
ibm tivoli_directory_server 6.2.0.3
ibm tivoli_directory_server 6.2.0.4
ibm tivoli_directory_server 6.2.0.5
ibm tivoli_directory_server 6.2.0.6
ibm tivoli_directory_server 6.2.0.7
ibm tivoli_directory_server 6.2.0.8
ibm tivoli_directory_server 6.2.0.10
ibm tivoli_directory_server 6.2.0.11
ibm tivoli_directory_server 6.2.0.12
ibm tivoli_directory_server 6.2.0.13
ibm tivoli_directory_server 6.2.0.14
ibm tivoli_directory_server 6.2.0.15
ibm tivoli_directory_server 6.3.0.0
ibm tivoli_directory_server 6.3.0.1
ibm tivoli_directory_server 6.3.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68335-7E15-4D94-8384-9292831E152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9F849-EB1F-4A8C-A3F3-9662241037C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AE41FA-98E4-4552-9658-7DAF605C4D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB37C65-CC59-4CB4-8A74-6634FF410345",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDBA9D2-E683-431A-B06C-5CCA55E44EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "86556AFA-F4F5-4C29-B59D-DC5281375E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E16D75E-7678-48AF-AA2D-33C167ACC99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBB97A26-E8A9-418C-87C9-F4837BF6680A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3922010D-4867-402C-9EC5-98FDEB281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D92F4-51B0-4DC0-B872-984AD0A6008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B93E759-1B76-421D-9684-F6FF77A99E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "344605B3-15C9-4E36-A22B-7EBC1207A03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15D60CA-8B3C-48D7-A860-1B72BCA14CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD03B74B-E234-4757-8D98-896DEA4CED7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF9CDD0-3F78-4489-A18D-40A1FAF705F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF6D03-9A58-477D-B5D0-030A373A58AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7636BE-22BB-44C3-B303-9780E2A24487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4E6E83-914D-467F-9EEA-56669B95CCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BBCED9-4260-40DC-A9A6-40CDB09BA92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D297D508-ACC2-41E7-B3F5-5AEDFE3E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD3BA3E-E015-4CB7-B686-19F45F8221C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F615EC-7530-468D-B62E-B07A1FE0431B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E278A8E-D7B6-450C-92D6-9955B22E18C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D85F4-1019-419D-8769-B1636385384C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CB6BE6-C851-4C31-A016-CCD4937277D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260260B-B69E-4B59-A0D1-1F71B92ABDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08631DE-72C4-462B-9763-41783EA8963C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50315494-8C1B-436B-8E24-8B8CA565FB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2759F8BC-8400-4AB1-81DD-51BD69BB720E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEB330D-5FC6-424B-85EF-06A56329FFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DE5E95-BA4A-42A2-B376-373331D9934E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87492D7-D0C6-4E4A-87B3-F44BC3149101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D872267B-B01D-4723-A522-8CDF684CB980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2234E088-31ED-4BBF-94C5-131E3B0CB994",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v5.2 anteriores a v5.2.0.5-TIV-ITDS-IF0010, v6.0 anteriores a v6.0.0.67 (tambi\u00e9n conocido como v6.0.0.8-TIV-ITDS-IF0009), v6.1 anteriores a v6.1.0.40 (tambi\u00e9n conocido como 6.1.0.5-TIV-ITDS-IF0003), v6.2 anteriores a v6.2.0.16 (tambi\u00e9n conocido como v6.2.0.3-TIV-ITDS-IF0002), y v6.3 anteriores a v6.3.0.3 (tambi\u00e9n conocido como v6.3.0.0-TIV-ITDS-IF0003)no manejar adecuadamente el valor ibm-auditAttributesOnGroupEvalOp para la auditor\u00eda de las operaciones extendidas, lo que podr\u00eda permitir a atacantes obtener informaci\u00f3n sensible mediante la lectura del registro de auditor\u00eda."
    }
  ],
  "id": "CVE-2011-1820",
  "lastModified": "2024-11-21T01:27:06.660",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 1.7,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:02.670",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1025358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-08 18:30
Modified
2024-11-21 01:06
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via unspecified vectors, related to (1) the ibmslapd.exe daemon on Windows and (2) the ibmdiradm daemon in the administration server on Linux, as demonstrated by certain modules in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2006-0717. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via unspecified vectors, related to (1) the ibmslapd.exe daemon on Windows and (2) the ibmdiradm daemon in the administration server on Linux, as demonstrated by certain modules in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2006-0717.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y fin del demonio) mediante vectores no especificados, relacionados con (1) el demonio \"ibmslapd.exe\" para Windows y (2) el demonio \"ibmdiradm\" en el servidor de administraci\u00f3n para Linux, como se ha demostrado por cierto m\u00f3dulo en VulnDisco Pack Professional v8.11, siendo una vulnerabilidad diferente a CVE-2006-0717. NOTA: hasta el 3-3-2009, esta divulgaci\u00f3n no ten\u00eda informaci\u00f3n para su puesta en pr\u00e1ctica. En cualquier caso, como el autor de VulnDisco Pack es un investigador reputado, se ha asignado un identificador CVE con fines de seguimiento."
    }
  ],
  "id": "CVE-2009-3089",
  "lastModified": "2024-11-21T01:06:30.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-08T18:30:00.530",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://intevydis.com/vd-list.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36565"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:58
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote attackers to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4
ibm aix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote attackers to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-LA0007 en AIX permite a atacantes remotos provocar una denegaci\u00f3n de servicio (servidor de desestabilizaci\u00f3n) a trav\u00e9s de una operaci\u00f3n de asignaci\u00f3n DIGEST-MD5 LDAP."
    }
  ],
  "id": "CVE-2008-7288",
  "lastModified": "2024-11-21T00:58:45.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:00.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09666"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg2402966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg2402966"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:21
Severity ?
Summary
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n do_extendedOp en ibmslapd en IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.62 (tambi\u00e9n conocida como 6.0.0.8-ITV-ITDS-IF0004) en Linux, Solaris y Windows permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ABEND) a trav\u00e9s de una operaci\u00f3n extentida sobre una petici\u00f3n LDAP mal construida que activa ciertas comparaciones que implican la operaci\u00f3n NULL OID."
    }
  ],
  "id": "CVE-2010-4785",
  "lastModified": "2024-11-21T01:21:46.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11814"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-07-17 20:55
Modified
2024-11-21 01:28
Severity ?
Summary
IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not require authentication for access to LDAP Server log files, which allows remote attackers to obtain sensitive information via a crafted URL.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5682108-A76B-443A-A172-7F17F54B5983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not require authentication for access to LDAP Server log files, which allows remote attackers to obtain sensitive information via a crafted URL."
    },
    {
      "lang": "es",
      "value": "La herramienta de administraci\u00f3n Web de IBM Tivoli Directory Server (TDS) v6.2 y anteriores a 6.2.0.3-TIV-ITDS-IF0004, IDSWebApp, no requiere autenticaci\u00f3n para el acceso a los archivos del servidor LDAP de registro, que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una URL a mano."
    }
  ],
  "id": "CVE-2011-2758",
  "lastModified": "2024-11-21T01:28:54.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-07-17T20:55:02.013",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45107"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14060"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48512"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-28 15:59
Modified
2024-11-21 02:26
Severity ?
Summary
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "La herramineta de administraci\u00f3n web en IBM Tivoli Security Directory Server 6.0 anterior a iFix 75, 6.1 anterior a iFix 68, 6.2 anterior a iFix 44, 6.3 anterior a iFix 37, 6.3.1 anterior a iFix 11, y 6.4 anterior a iFix 2 permite a usuarios remotos autenticados evadir las restricciones de comandos a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2015-1974",
  "lastModified": "2024-11-21T02:26:30.027",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-28T15:59:02.127",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75438"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-15 18:59
Modified
2024-11-21 02:26
Summary
Directory traversal vulnerability in the Web Administration tool in IBM Tivoli Directory Server (ITDS) before 6.1.0.74-ISS-ISDS-IF0074, 6.2.x before 6.2.0.50-ISS-ISDS-IF0050, and 6.3.x before 6.3.0.43-ISS-ISDS-IF0043 and IBM Security Directory Server (ISDS) before 6.3.1.18-ISS-ISDS-IF0018 and 6.4.x before 6.4.0.9-ISS-ISDS-IF0009 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 6.2.0
ibm tivoli_directory_server 6.2.0.0
ibm tivoli_directory_server 6.2.0.1
ibm tivoli_directory_server 6.2.0.2
ibm tivoli_directory_server 6.2.0.3
ibm tivoli_directory_server 6.2.0.4
ibm tivoli_directory_server 6.2.0.5
ibm tivoli_directory_server 6.2.0.6
ibm tivoli_directory_server 6.2.0.7
ibm tivoli_directory_server 6.2.0.8
ibm tivoli_directory_server 6.2.0.10
ibm tivoli_directory_server 6.2.0.11
ibm tivoli_directory_server 6.2.0.12
ibm tivoli_directory_server 6.2.0.13
ibm tivoli_directory_server 6.2.0.14
ibm tivoli_directory_server 6.2.0.15
ibm tivoli_directory_server 6.2.0.19
ibm tivoli_directory_server 6.2.0.20
ibm tivoli_directory_server 6.2.0.21
ibm tivoli_directory_server 6.2.0.22
ibm tivoli_directory_server 6.2.0.23
ibm tivoli_directory_server 6.2.0.24
ibm tivoli_directory_server 6.2.0.25
ibm tivoli_directory_server 6.2.0.26
ibm tivoli_directory_server 6.2.0.27
ibm tivoli_directory_server 6.2.0.29
ibm tivoli_directory_server 6.2.0.30
ibm tivoli_directory_server 6.2.0.31
ibm tivoli_directory_server 6.2.0.32
ibm tivoli_directory_server 6.2.0.33
ibm tivoli_directory_server 6.2.0.34
ibm tivoli_directory_server 6.2.0.35
ibm tivoli_directory_server 6.2.0.36
ibm tivoli_directory_server 6.2.0.37
ibm tivoli_directory_server 6.2.0.38
ibm tivoli_directory_server 6.2.0.39
ibm tivoli_directory_server 6.2.0.40
ibm tivoli_directory_server 6.2.0.41
ibm tivoli_directory_server 6.2.0.42
ibm tivoli_directory_server 6.2.0.43
ibm tivoli_directory_server 6.2.0.44
ibm tivoli_directory_server 6.2.0.45
ibm tivoli_directory_server 6.2.0.46
ibm tivoli_directory_server 6.2.0.47
ibm tivoli_directory_server 6.2.0.48
ibm tivoli_directory_server 6.2.0.49
ibm tivoli_directory_server 6.3.0
ibm tivoli_directory_server 6.3.0.0
ibm tivoli_directory_server 6.3.0.1
ibm tivoli_directory_server 6.3.0.2
ibm tivoli_directory_server 6.3.0.8
ibm tivoli_directory_server 6.3.0.9
ibm tivoli_directory_server 6.3.0.10
ibm tivoli_directory_server 6.3.0.11
ibm tivoli_directory_server 6.3.0.12
ibm tivoli_directory_server 6.3.0.14
ibm tivoli_directory_server 6.3.0.15
ibm tivoli_directory_server 6.3.0.17
ibm tivoli_directory_server 6.3.0.18
ibm tivoli_directory_server 6.3.0.19
ibm tivoli_directory_server 6.3.0.21
ibm tivoli_directory_server 6.3.0.22
ibm tivoli_directory_server 6.3.0.23
ibm tivoli_directory_server 6.3.0.24
ibm tivoli_directory_server 6.3.0.25
ibm tivoli_directory_server 6.3.0.26
ibm tivoli_directory_server 6.3.0.27
ibm tivoli_directory_server 6.3.0.28
ibm tivoli_directory_server 6.3.0.29
ibm tivoli_directory_server 6.3.0.30
ibm tivoli_directory_server 6.3.0.31
ibm tivoli_directory_server 6.3.0.32
ibm tivoli_directory_server 6.3.0.33
ibm tivoli_directory_server 6.3.0.34
ibm tivoli_directory_server 6.3.0.35
ibm tivoli_directory_server 6.3.0.36
ibm tivoli_directory_server 6.3.0.37
ibm tivoli_directory_server 6.3.0.38
ibm tivoli_directory_server 6.3.0.39
ibm tivoli_directory_server 6.3.0.40
ibm tivoli_directory_server 6.3.0.41
ibm tivoli_directory_server 6.3.0.42
ibm tivoli_directory_server 6.3.1.0
ibm tivoli_directory_server 6.3.1.5
ibm tivoli_directory_server 6.3.1.6
ibm tivoli_directory_server 6.3.1.7
ibm tivoli_directory_server 6.3.1.8
ibm tivoli_directory_server 6.3.1.9
ibm tivoli_directory_server 6.1.0
ibm tivoli_directory_server 6.1.0.0
ibm tivoli_directory_server 6.1.0.1
ibm tivoli_directory_server 6.1.0.2
ibm tivoli_directory_server 6.1.0.3
ibm tivoli_directory_server 6.1.0.4
ibm tivoli_directory_server 6.1.0.5
ibm tivoli_directory_server 6.1.0.6
ibm tivoli_directory_server 6.1.0.7
ibm tivoli_directory_server 6.1.0.8
ibm tivoli_directory_server 6.1.0.9
ibm tivoli_directory_server 6.1.0.10
ibm tivoli_directory_server 6.1.0.11
ibm tivoli_directory_server 6.1.0.12
ibm tivoli_directory_server 6.1.0.13
ibm tivoli_directory_server 6.1.0.14
ibm tivoli_directory_server 6.1.0.15
ibm tivoli_directory_server 6.1.0.17
ibm tivoli_directory_server 6.1.0.18
ibm tivoli_directory_server 6.1.0.19
ibm tivoli_directory_server 6.1.0.20
ibm tivoli_directory_server 6.1.0.21
ibm tivoli_directory_server 6.1.0.22
ibm tivoli_directory_server 6.1.0.23
ibm tivoli_directory_server 6.1.0.24
ibm tivoli_directory_server 6.1.0.25
ibm tivoli_directory_server 6.1.0.26
ibm tivoli_directory_server 6.1.0.27
ibm tivoli_directory_server 6.1.0.28
ibm tivoli_directory_server 6.1.0.29
ibm tivoli_directory_server 6.1.0.30
ibm tivoli_directory_server 6.1.0.31
ibm tivoli_directory_server 6.1.0.32
ibm tivoli_directory_server 6.1.0.33
ibm tivoli_directory_server 6.1.0.34
ibm tivoli_directory_server 6.1.0.35
ibm tivoli_directory_server 6.1.0.36
ibm tivoli_directory_server 6.1.0.37
ibm tivoli_directory_server 6.1.0.38
ibm tivoli_directory_server 6.1.0.39
ibm tivoli_directory_server 6.1.0.40
ibm tivoli_directory_server 6.1.0.41
ibm tivoli_directory_server 6.1.0.42
ibm tivoli_directory_server 6.1.0.43
ibm tivoli_directory_server 6.1.0.44
ibm tivoli_directory_server 6.1.0.45
ibm tivoli_directory_server 6.1.0.46
ibm tivoli_directory_server 6.1.0.47
ibm tivoli_directory_server 6.1.0.48
ibm tivoli_directory_server 6.1.0.49
ibm tivoli_directory_server 6.1.0.50
ibm tivoli_directory_server 6.1.0.51
ibm tivoli_directory_server 6.1.0.52
ibm tivoli_directory_server 6.1.0.53
ibm tivoli_directory_server 6.1.0.54
ibm tivoli_directory_server 6.1.0.55
ibm tivoli_directory_server 6.1.0.56
ibm tivoli_directory_server 6.1.0.57
ibm tivoli_directory_server 6.1.0.58
ibm tivoli_directory_server 6.1.0.59
ibm tivoli_directory_server 6.1.0.60
ibm tivoli_directory_server 6.1.0.61
ibm tivoli_directory_server 6.1.0.62
ibm tivoli_directory_server 6.1.0.63
ibm tivoli_directory_server 6.1.0.64
ibm tivoli_directory_server 6.1.0.65
ibm tivoli_directory_server 6.1.0.66
ibm tivoli_directory_server 6.1.0.67
ibm tivoli_directory_server 6.1.0.68
ibm tivoli_directory_server 6.1.0.69
ibm tivoli_directory_server 6.1.0.70
ibm tivoli_directory_server 6.1.0.71
ibm tivoli_directory_server 6.1.0.72
ibm tivoli_directory_server 6.1.0.73
ibm security_directory_server 6.4.0
ibm security_directory_server 6.4.0.0
ibm security_directory_server 6.4.0.1
ibm security_directory_server 6.4.0.2
ibm security_directory_server 6.4.0.3
ibm security_directory_server 6.4.0.4
ibm security_directory_server 6.4.0.5
ibm security_directory_server 6.4.0.6
ibm security_directory_server 6.4.0.7
ibm security_directory_server 6.4.0.8
ibm security_directory_server 6.3.1
ibm security_directory_server 6.3.1.0
ibm security_directory_server 6.3.1.1
ibm security_directory_server 6.3.1.2
ibm security_directory_server 6.3.1.3
ibm security_directory_server 6.3.1.4
ibm security_directory_server 6.3.1.5
ibm security_directory_server 6.3.1.6
ibm security_directory_server 6.3.1.7
ibm security_directory_server 6.3.1.8
ibm security_directory_server 6.3.1.9
ibm security_directory_server 6.3.1.10
ibm security_directory_server 6.3.1.11
ibm security_directory_server 6.3.1.12
ibm security_directory_server 6.3.1.13
ibm security_directory_server 6.3.1.14
ibm security_directory_server 6.3.1.15
ibm security_directory_server 6.3.1.16
ibm security_directory_server 6.3.1.17



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7165C049-258B-425D-B36B-152BBF3F8727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CB6BE6-C851-4C31-A016-CCD4937277D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260260B-B69E-4B59-A0D1-1F71B92ABDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08631DE-72C4-462B-9763-41783EA8963C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50315494-8C1B-436B-8E24-8B8CA565FB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2759F8BC-8400-4AB1-81DD-51BD69BB720E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEB330D-5FC6-424B-85EF-06A56329FFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DE5E95-BA4A-42A2-B376-373331D9934E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87492D7-D0C6-4E4A-87B3-F44BC3149101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8B3BE0-2515-4CB1-B124-5462703CD32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B735E0-B531-4684-8BF5-0540F5B8FBEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "677E05F0-F000-4C5F-83D7-7E2ED5CCB0A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E923364-6895-4B51-9C3F-B150EC6A541D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F288406-D938-415D-AD92-F8AFC7219691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BBE891-2D1F-485D-A509-1A851CE83111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6771D20-C32B-4324-89E6-387724922D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8A4729-46F8-44BE-B31C-FFB761C17D89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "C87A9397-6290-4D19-8A80-0D439B5915A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60F206-4C09-4E06-98F5-8B4C85714803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F293FC-C7C7-41A3-A5B0-5203B000D41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC09987-98C8-4395-871F-E45C9745ACD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB52381-38CB-4B68-9515-019FE318CA92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F3261B-9595-493A-9CFB-F3C049C570C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD872AF-0478-457D-87DA-FC125378411F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD471E9-2DD0-4364-ABC2-9CFC0747A477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A40152-B83F-454A-A94E-F694512F56FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE73B82-CC1C-4F5D-A8D3-7AD151665B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "5365E6BD-067B-46F8-A2F6-B46801B55FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7EA7C3-A9AE-4C55-88FC-06DA3A03766A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "18669C8F-8187-4AFF-8352-53F0BCB3250E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BED472B-2F14-4BA5-97A2-BE956790BCA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "452BF23D-E083-431A-9D8C-601AE9E80EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "152DA7E5-A00D-4E20-AE94-AF9C0339A378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DDE3BFF-FB14-4021-BD99-3D4E67AFF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "E12F3696-BE10-414C-AABC-20678582E27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "168B8B0B-A76D-453D-8E4A-7CEE8C20CD2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C3DDD9-9013-414E-B5EB-65F576E12778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D872267B-B01D-4723-A522-8CDF684CB980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2234E088-31ED-4BBF-94C5-131E3B0CB994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCF803A-86AE-4875-ABD8-2DDB44D88F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3E505A-C749-4465-964F-0699DB9C094A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B64779-4C28-4538-8F3C-EE32152AA8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A389475F-F043-40B7-894E-C8338EF86C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD77105-5410-474A-B42F-5CC69CB5FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "869DB569-F140-4AD9-B230-2A5752BAEA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5545F04-B8D1-48FB-BDAD-27E1260AEB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A2FA81-F8D6-4255-8F55-A0B746D84691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C950A3E7-7CD2-4BB2-89B4-C708735371A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC98E9A-E879-4A28-93E9-0977F7B4C860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF81D730-514C-4A9A-8683-54A1AD4E8F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "6369ACB4-475E-4349-A6C3-7B718660F65D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3EEB0C-7CFC-4CB3-A177-6A59BD4A68C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B3EE13-1C01-49DD-A642-C061783D958B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30DA3DA-82E3-4E8D-9077-66AE9B5A374F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E70DE3A2-A6D7-4493-9182-1C0B7FBDF90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "403A84D2-4D3E-483B-A14A-AF1CEF06B9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B3CD94-82B3-4265-9A9E-2F008F7051E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BFB392-F7EE-4448-A3AA-65E3269C1DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A621A28-D193-4C1B-8008-422DCE5229ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "378EB8A4-7F3A-463A-8D12-83800BC0C0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEFC8686-795C-455B-B411-BD56E91683CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "59568EE3-3365-4864-BAAB-CE56DE2420ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3A04A-B6F9-4C69-8A4D-4415D10C73C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5DAFE9-F022-4240-AFDA-5B44E303F889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B0F83AF-9EEE-4FA6-863D-8F431A4DBE24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "0022037B-042F-4395-8B5A-551848255FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "77594440-BB78-4131-AD83-56F88AD42DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAF5D43-946F-4910-BFAD-4C8000E288B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F2E5AF-F403-427F-B58C-A74849DFC0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "676FED1D-BFF8-44DF-B2B7-0B450B29AD10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B9F7CDC-35BF-47CC-909F-CB3F76285A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6406B436-A4C1-4936-AF73-C62DC663588A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "64144623-32F7-4FD7-AE40-875078EF6954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0BCFF6A-7A7F-4DB7-B2AC-54A35B4F006D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "94CFDA59-051E-46C0-814A-CDE82C29B3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1C266D-606B-47A3-898F-01D794F591E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDBA9D2-E683-431A-B06C-5CCA55E44EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "86556AFA-F4F5-4C29-B59D-DC5281375E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E16D75E-7678-48AF-AA2D-33C167ACC99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBB97A26-E8A9-418C-87C9-F4837BF6680A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3922010D-4867-402C-9EC5-98FDEB281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D92F4-51B0-4DC0-B872-984AD0A6008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B93E759-1B76-421D-9684-F6FF77A99E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "344605B3-15C9-4E36-A22B-7EBC1207A03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15D60CA-8B3C-48D7-A860-1B72BCA14CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD03B74B-E234-4757-8D98-896DEA4CED7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF9CDD0-3F78-4489-A18D-40A1FAF705F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF6D03-9A58-477D-B5D0-030A373A58AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7636BE-22BB-44C3-B303-9780E2A24487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4E6E83-914D-467F-9EEA-56669B95CCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BBCED9-4260-40DC-A9A6-40CDB09BA92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D297D508-ACC2-41E7-B3F5-5AEDFE3E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD3BA3E-E015-4CB7-B686-19F45F8221C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F615EC-7530-468D-B62E-B07A1FE0431B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E278A8E-D7B6-450C-92D6-9955B22E18C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D85F4-1019-419D-8769-B1636385384C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D3F8DB-C145-403F-92DE-CF4D5DC83177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE3E56E-95DC-4706-9FBE-622FFA9C8092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "684BD112-7763-4901-973C-D2ABB10CCE3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "311FA0A0-FACB-4A20-AA75-35EF1FF6F0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8CA71-D7A8-4841-A895-E009F3552359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43ECBF2-8D39-469F-8D45-B2FA44B3A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "18ABDC8A-118C-4A35-A396-1020A9469D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "38204AD1-BF0E-4521-9EE6-66214B4A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "218DD29F-18C9-489D-9273-4705BFCDE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "3947B542-1356-4645-A792-E27DB2C07DCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "39A69967-1505-45AB-B70B-9E9C15AB6798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AE0B38-8249-4959-B031-996EC4EE92FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "0652BE9E-5EC8-436A-A88E-4707F36C5893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2541DAF-6093-4411-98C6-A41F49D224D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC763F0-71C3-494C-AD5D-A3389D643328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C19DFC0-14CC-456D-AC84-D9F634F9734F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2BE5F0-CEEB-480A-9B80-D08142659C24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "540FD770-3493-4C44-A3B4-2AB307E0B472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F359B1-7984-4BB8-9408-440745AFBF4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "472B5989-E033-449C-AB90-E24FE7F99125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B938E8-26C7-425C-AA54-081FF3EC00F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "202262F1-6CB8-4235-B5F0-00FDC6FB614D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF29B53-180C-4B20-90D5-480C467F5746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B7FD9C-FEA9-4001-BD48-10B02B38989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55B351A-E773-42F0-A7EA-F1874F7BCCCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "57FB18BD-4C72-436C-85CB-06037E2CFC1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC0FD9F-A137-4AD1-8F77-58E822070D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD21537-4540-4D74-80F9-5999A5506D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B343912-E222-4C9B-906A-1B3069D2231E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "A27D29E2-80FA-438C-AFE6-DEF78F79D2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D28A41B-CABC-4260-BF6F-21CAE3E53244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C702E7-1331-4E80-9C1D-72F8629F5D99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7D24D3-628A-4C33-AA03-84AB1DF41344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EC9115-FBCC-4A87-B0E5-BB13C3982338",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30CF683-05B0-4056-AD7C-B9A2278A1B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A76D30-88CD-418A-BEA2-BAD93A892FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB4913DA-4540-46BA-A249-D635D67D829F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9602D062-F243-428F-8938-0805B9BEFB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "189C9DEF-136A-46AB-B320-6934C313DA8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "832EE5FD-B99D-4F5F-B41E-E0893E63E0D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F62A02C-E84B-4570-BAB6-995E423173A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D879EBF4-894C-4272-B8D9-1E5E34187BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F2E7CC-C7CF-4817-857B-886961BC0811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C2CA356-BF67-4B67-9355-62ED2057F534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D71241-E8BE-4E48-8E25-DFCC919FF5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6207324-D4F6-4FD6-97C2-3AA3C124E6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47D9A14A-E167-49AF-B675-B7C7933F64D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E22DDAC-4419-4214-BBB8-4984AA8F9090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC77DA6D-55EC-4B98-9E75-57F9AD0642DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0837005C-126A-4800-A3B1-74A22F0DC617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D1C332-CFFA-4FA5-9BEF-673BE30E8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69DE7246-2030-4F00-A3B5-B9E911441449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F43466E-EF4B-48D8-A04C-90C010C895BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4D2984-27DA-4145-948C-6A4598AD93CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9DC7E6-AD81-4A18-89B3-BC85538F5D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ADD2FE5-C458-49A6-B3BA-8A699AD4F67D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A48BD98-4EF8-4DD3-9FFB-137FC6D88360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C7EA5F-FA03-496A-9985-5C2216D7BF6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1852806-44FC-4CFA-A62D-AA7DC5B53B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1ACED89-C2B6-4DD1-A479-7D24D1BC0629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "535B9657-0138-42BA-814A-17862CBD460C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "87FE5D8D-0897-44B9-BE7A-C95F42E53A76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7319134D-22D3-4618-944A-7D2443E7839F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the Web Administration tool in IBM Tivoli Directory Server (ITDS) before 6.1.0.74-ISS-ISDS-IF0074, 6.2.x before 6.2.0.50-ISS-ISDS-IF0050, and 6.3.x before 6.3.0.43-ISS-ISDS-IF0043 and IBM Security Directory Server (ISDS) before 6.3.1.18-ISS-ISDS-IF0018 and 6.4.x before 6.4.0.9-ISS-ISDS-IF0009 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en la herramienta Web Administration en IBM Tivoli Directory Server (ITDS) en versiones anteriores a 6.1.0.74-ISS-ISDS-IF0074, 6.2.x en versiones anteriores a 6.2.0.50-ISS-ISDS-IF0050 y 6.3.x en versiones anteriores a 6.3.0.43-ISS-ISDS-IF0043 y IBM Security Directory Server (ISDS) en versiones anteriores a 6.3.1.18-ISS-ISDS-IF0018 y 6.4.x en versiones anteriores a 6.4.0.9-ISS-ISDS-IF0009 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de .. (punto punto) en una URL."
    }
  ],
  "id": "CVE-2015-1977",
  "lastModified": "2024-11-21T02:26:30.370",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-15T18:59:00.140",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:40
Severity ?
Summary
The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n get_filter_list en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-LA0006 no realiza correctamente el an\u00e1lisis sint\u00e1ctico de algunos subfiltros, lo que permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de una b\u00fasqueda con un filtro con formato incorrecto."
    }
  ],
  "id": "CVE-2007-6742",
  "lastModified": "2024-11-21T00:40:54.017",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:00.810",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07450"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:21
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) does not perform certain locking of linked-list access, which allows remote authenticated users to cause a denial of service (daemon crash) via a paged search.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) does not perform certain locking of linked-list access, which allows remote authenticated users to cause a denial of service (daemon crash) via a paged search."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.62 (tambien conocido como v6.0.0.8-ITV-ITDS-IF0004) no realiza el bloqueo del acceso a determinados accesos a listas de enlaces, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una b\u00fasqueda paginada."
    }
  ],
  "id": "CVE-2010-4788",
  "lastModified": "2024-11-21T01:21:46.713",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11943"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:25
Severity ?
Summary
Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request. NOTE: some of these details are obtained from third party information.
References
cve@mitre.orghttp://secunia.com/advisories/44184Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/8213
cve@mitre.orghttp://securitytracker.com/id?1025358
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14009
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14010
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14013
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14045
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg1IO14046
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg21496117
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029659Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029660Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029661Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029663Patch
cve@mitre.orghttp://www.ibm.com/support/docview.wss?uid=swg24029672Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/66711
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44184Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8213
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025358
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14009
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14010
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14013
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14045
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg1IO14046
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg21496117
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029659Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029660Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029661Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029663Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg24029672Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66711
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4
ibm tivoli_directory_server 6.0
ibm tivoli_directory_server 6.0.0.0
ibm tivoli_directory_server 6.0.0.1
ibm tivoli_directory_server 6.0.0.7
ibm tivoli_directory_server 6.0.0.8
ibm tivoli_directory_server 6.0.0.14
ibm tivoli_directory_server 6.0.0.19
ibm tivoli_directory_server 6.0.0.33
ibm tivoli_directory_server 6.0.0.41
ibm tivoli_directory_server 6.0.0.45
ibm tivoli_directory_server 6.0.0.52
ibm tivoli_directory_server 6.0.0.53
ibm tivoli_directory_server 6.0.0.54
ibm tivoli_directory_server 6.0.0.55
ibm tivoli_directory_server 6.0.0.56
ibm tivoli_directory_server 6.0.0.57
ibm tivoli_directory_server 6.0.0.58
ibm tivoli_directory_server 6.0.0.59
ibm tivoli_directory_server 6.0.0.60
ibm tivoli_directory_server 6.0.0.61
ibm tivoli_directory_server 6.0.0.62
ibm tivoli_directory_server 6.0.0.63
ibm tivoli_directory_server 6.0.0.64
ibm tivoli_directory_server 6.0.0.65
ibm tivoli_directory_server 6.0.0.66
ibm tivoli_directory_server 6.1.0.0
ibm tivoli_directory_server 6.1.0.1
ibm tivoli_directory_server 6.1.0.2
ibm tivoli_directory_server 6.1.0.3
ibm tivoli_directory_server 6.1.0.4
ibm tivoli_directory_server 6.1.0.5
ibm tivoli_directory_server 6.1.0.6
ibm tivoli_directory_server 6.1.0.7
ibm tivoli_directory_server 6.1.0.8
ibm tivoli_directory_server 6.1.0.9
ibm tivoli_directory_server 6.1.0.10
ibm tivoli_directory_server 6.1.0.11
ibm tivoli_directory_server 6.1.0.12
ibm tivoli_directory_server 6.1.0.13
ibm tivoli_directory_server 6.1.0.14
ibm tivoli_directory_server 6.1.0.15
ibm tivoli_directory_server 6.1.0.17
ibm tivoli_directory_server 6.1.0.18
ibm tivoli_directory_server 6.1.0.19
ibm tivoli_directory_server 6.1.0.20
ibm tivoli_directory_server 6.1.0.21
ibm tivoli_directory_server 6.1.0.22
ibm tivoli_directory_server 6.1.0.23
ibm tivoli_directory_server 6.1.0.24
ibm tivoli_directory_server 6.1.0.25
ibm tivoli_directory_server 6.1.0.26
ibm tivoli_directory_server 6.1.0.27
ibm tivoli_directory_server 6.1.0.28
ibm tivoli_directory_server 6.1.0.29
ibm tivoli_directory_server 6.1.0.30
ibm tivoli_directory_server 6.1.0.31
ibm tivoli_directory_server 6.1.0.32
ibm tivoli_directory_server 6.1.0.33
ibm tivoli_directory_server 6.1.0.34
ibm tivoli_directory_server 6.1.0.35
ibm tivoli_directory_server 6.1.0.36
ibm tivoli_directory_server 6.1.0.37
ibm tivoli_directory_server 6.1.0.38
ibm tivoli_directory_server 6.1.0.39
ibm tivoli_directory_server 6.2.0.0
ibm tivoli_directory_server 6.2.0.1
ibm tivoli_directory_server 6.2.0.2
ibm tivoli_directory_server 6.2.0.3
ibm tivoli_directory_server 6.2.0.4
ibm tivoli_directory_server 6.2.0.5
ibm tivoli_directory_server 6.2.0.6
ibm tivoli_directory_server 6.2.0.7
ibm tivoli_directory_server 6.2.0.8
ibm tivoli_directory_server 6.2.0.10
ibm tivoli_directory_server 6.2.0.11
ibm tivoli_directory_server 6.2.0.12
ibm tivoli_directory_server 6.2.0.13
ibm tivoli_directory_server 6.2.0.14
ibm tivoli_directory_server 6.2.0.15
ibm tivoli_directory_server 6.3.0.0
ibm tivoli_directory_server 6.3.0.1
ibm tivoli_directory_server 6.3.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68335-7E15-4D94-8384-9292831E152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F9F849-EB1F-4A8C-A3F3-9662241037C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AE41FA-98E4-4552-9658-7DAF605C4D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB37C65-CC59-4CB4-8A74-6634FF410345",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDBA9D2-E683-431A-B06C-5CCA55E44EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "86556AFA-F4F5-4C29-B59D-DC5281375E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E16D75E-7678-48AF-AA2D-33C167ACC99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBB97A26-E8A9-418C-87C9-F4837BF6680A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3922010D-4867-402C-9EC5-98FDEB281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D92F4-51B0-4DC0-B872-984AD0A6008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B93E759-1B76-421D-9684-F6FF77A99E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "344605B3-15C9-4E36-A22B-7EBC1207A03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15D60CA-8B3C-48D7-A860-1B72BCA14CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD03B74B-E234-4757-8D98-896DEA4CED7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF9CDD0-3F78-4489-A18D-40A1FAF705F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF6D03-9A58-477D-B5D0-030A373A58AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7636BE-22BB-44C3-B303-9780E2A24487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4E6E83-914D-467F-9EEA-56669B95CCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BBCED9-4260-40DC-A9A6-40CDB09BA92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D297D508-ACC2-41E7-B3F5-5AEDFE3E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD3BA3E-E015-4CB7-B686-19F45F8221C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F615EC-7530-468D-B62E-B07A1FE0431B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E278A8E-D7B6-450C-92D6-9955B22E18C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D85F4-1019-419D-8769-B1636385384C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CB6BE6-C851-4C31-A016-CCD4937277D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260260B-B69E-4B59-A0D1-1F71B92ABDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08631DE-72C4-462B-9763-41783EA8963C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50315494-8C1B-436B-8E24-8B8CA565FB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2759F8BC-8400-4AB1-81DD-51BD69BB720E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEB330D-5FC6-424B-85EF-06A56329FFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DE5E95-BA4A-42A2-B376-373331D9934E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87492D7-D0C6-4E4A-87B3-F44BC3149101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D872267B-B01D-4723-A522-8CDF684CB980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2234E088-31ED-4BBF-94C5-131E3B0CB994",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el proceso de servidor en ibmslapd.exe en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-IF0010, v6.0 anterior a v6.0.0.67 (tambi\u00e9n conocido como v6.0.0.8-ITV -ITDS-IF0009), v6.1 anterior a v6.1.0.40 (tambi\u00e9n conocido como v6.1.0.5-ITV-ITDS-IF0003), v6.2 anterior a v6.2.0.16 (tambi\u00e9n conocido como v6.2.0.3-ITV-ITDS-IF0002), y v6.3 anterior a v6.3.0.3 tambi\u00e9n conocido como v6.3.0.0-ITV-ITDS-IF0003) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un elaborado solicitud LDAP.  NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2011-1206",
  "lastModified": "2024-11-21T01:25:47.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:02.623",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8213"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1025358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14009"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14013"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14045"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21496117"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21496117"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66711"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-10-19 01:55
Modified
2024-11-21 02:13
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Admin UI in IBM Tivoli Directory Server 6.1 before 6.1.0.64-ISS-ITDS-IF0064, 6.2 before 6.2.0.39-ISS-ITDS-FP0039, and 6.3 before 6.3.0.33-ISS-ITDS-IF0033, and IBM Security Directory Server 6.3.1 before 6.3.1.7-ISS-ISDS-IF0007, allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Impacted products
Vendor Product Version
ibm security_directory_server 6.3.1
ibm security_directory_server 6.3.1.1
ibm security_directory_server 6.3.1.2
ibm security_directory_server 6.3.1.3
ibm security_directory_server 6.3.1.4
ibm security_directory_server 6.3.1.5
ibm security_directory_server 6.3.1.6
ibm tivoli_directory_server 6.1.0
ibm tivoli_directory_server 6.1.0.0
ibm tivoli_directory_server 6.1.0.1
ibm tivoli_directory_server 6.1.0.2
ibm tivoli_directory_server 6.1.0.3
ibm tivoli_directory_server 6.1.0.4
ibm tivoli_directory_server 6.1.0.5
ibm tivoli_directory_server 6.1.0.6
ibm tivoli_directory_server 6.1.0.7
ibm tivoli_directory_server 6.1.0.8
ibm tivoli_directory_server 6.1.0.9
ibm tivoli_directory_server 6.1.0.10
ibm tivoli_directory_server 6.1.0.11
ibm tivoli_directory_server 6.1.0.12
ibm tivoli_directory_server 6.1.0.13
ibm tivoli_directory_server 6.1.0.14
ibm tivoli_directory_server 6.1.0.15
ibm tivoli_directory_server 6.1.0.17
ibm tivoli_directory_server 6.1.0.18
ibm tivoli_directory_server 6.1.0.19
ibm tivoli_directory_server 6.1.0.20
ibm tivoli_directory_server 6.1.0.21
ibm tivoli_directory_server 6.1.0.22
ibm tivoli_directory_server 6.1.0.23
ibm tivoli_directory_server 6.1.0.24
ibm tivoli_directory_server 6.1.0.25
ibm tivoli_directory_server 6.1.0.26
ibm tivoli_directory_server 6.1.0.27
ibm tivoli_directory_server 6.1.0.28
ibm tivoli_directory_server 6.1.0.29
ibm tivoli_directory_server 6.1.0.30
ibm tivoli_directory_server 6.1.0.31
ibm tivoli_directory_server 6.1.0.32
ibm tivoli_directory_server 6.1.0.33
ibm tivoli_directory_server 6.1.0.34
ibm tivoli_directory_server 6.1.0.35
ibm tivoli_directory_server 6.1.0.36
ibm tivoli_directory_server 6.1.0.37
ibm tivoli_directory_server 6.1.0.38
ibm tivoli_directory_server 6.1.0.39
ibm tivoli_directory_server 6.1.0.45
ibm tivoli_directory_server 6.1.0.46
ibm tivoli_directory_server 6.1.0.47
ibm tivoli_directory_server 6.1.0.48
ibm tivoli_directory_server 6.1.0.63
ibm tivoli_directory_server 6.2
ibm tivoli_directory_server 6.2.0
ibm tivoli_directory_server 6.2.0.0
ibm tivoli_directory_server 6.2.0.1
ibm tivoli_directory_server 6.2.0.2
ibm tivoli_directory_server 6.2.0.3
ibm tivoli_directory_server 6.2.0.4
ibm tivoli_directory_server 6.2.0.5
ibm tivoli_directory_server 6.2.0.6
ibm tivoli_directory_server 6.2.0.7
ibm tivoli_directory_server 6.2.0.8
ibm tivoli_directory_server 6.2.0.10
ibm tivoli_directory_server 6.2.0.11
ibm tivoli_directory_server 6.2.0.12
ibm tivoli_directory_server 6.2.0.13
ibm tivoli_directory_server 6.2.0.14
ibm tivoli_directory_server 6.2.0.15
ibm tivoli_directory_server 6.2.0.19
ibm tivoli_directory_server 6.2.0.20
ibm tivoli_directory_server 6.2.0.21
ibm tivoli_directory_server 6.2.0.22
ibm tivoli_directory_server 6.2.0.38
ibm tivoli_directory_server 6.3.0
ibm tivoli_directory_server 6.3.0.0
ibm tivoli_directory_server 6.3.0.1
ibm tivoli_directory_server 6.3.0.2
ibm tivoli_directory_server 6.3.0.8
ibm tivoli_directory_server 6.3.0.9
ibm tivoli_directory_server 6.3.0.10
ibm tivoli_directory_server 6.3.0.32



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D71241-E8BE-4E48-8E25-DFCC919FF5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47D9A14A-E167-49AF-B675-B7C7933F64D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E22DDAC-4419-4214-BBB8-4984AA8F9090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC77DA6D-55EC-4B98-9E75-57F9AD0642DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0837005C-126A-4800-A3B1-74A22F0DC617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D1C332-CFFA-4FA5-9BEF-673BE30E8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:security_directory_server:6.3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69DE7246-2030-4F00-A3B5-B9E911441449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDBA9D2-E683-431A-B06C-5CCA55E44EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "86556AFA-F4F5-4C29-B59D-DC5281375E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E16D75E-7678-48AF-AA2D-33C167ACC99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBB97A26-E8A9-418C-87C9-F4837BF6680A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3922010D-4867-402C-9EC5-98FDEB281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D92F4-51B0-4DC0-B872-984AD0A6008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B93E759-1B76-421D-9684-F6FF77A99E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "344605B3-15C9-4E36-A22B-7EBC1207A03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15D60CA-8B3C-48D7-A860-1B72BCA14CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD03B74B-E234-4757-8D98-896DEA4CED7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF9CDD0-3F78-4489-A18D-40A1FAF705F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF6D03-9A58-477D-B5D0-030A373A58AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7636BE-22BB-44C3-B303-9780E2A24487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4E6E83-914D-467F-9EEA-56669B95CCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BBCED9-4260-40DC-A9A6-40CDB09BA92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D297D508-ACC2-41E7-B3F5-5AEDFE3E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD3BA3E-E015-4CB7-B686-19F45F8221C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F615EC-7530-468D-B62E-B07A1FE0431B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E278A8E-D7B6-450C-92D6-9955B22E18C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D85F4-1019-419D-8769-B1636385384C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43ECBF2-8D39-469F-8D45-B2FA44B3A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "18ABDC8A-118C-4A35-A396-1020A9469D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "38204AD1-BF0E-4521-9EE6-66214B4A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "218DD29F-18C9-489D-9273-4705BFCDE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B7FD9C-FEA9-4001-BD48-10B02B38989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5682108-A76B-443A-A172-7F17F54B5983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7165C049-258B-425D-B36B-152BBF3F8727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBAF2E5-4931-41AF-BCDA-D769B06FB05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98186E56-0F75-4306-9E34-A388EA2FD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CB6BE6-C851-4C31-A016-CCD4937277D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260260B-B69E-4B59-A0D1-1F71B92ABDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08631DE-72C4-462B-9763-41783EA8963C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50315494-8C1B-436B-8E24-8B8CA565FB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2759F8BC-8400-4AB1-81DD-51BD69BB720E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEB330D-5FC6-424B-85EF-06A56329FFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DE5E95-BA4A-42A2-B376-373331D9934E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87492D7-D0C6-4E4A-87B3-F44BC3149101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8B3BE0-2515-4CB1-B124-5462703CD32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD471E9-2DD0-4364-ABC2-9CFC0747A477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C3DDD9-9013-414E-B5EB-65F576E12778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D872267B-B01D-4723-A522-8CDF684CB980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2234E088-31ED-4BBF-94C5-131E3B0CB994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCF803A-86AE-4875-ABD8-2DDB44D88F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3E505A-C749-4465-964F-0699DB9C094A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B64779-4C28-4538-8F3C-EE32152AA8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEFC8686-795C-455B-B411-BD56E91683CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Admin UI in IBM Tivoli Directory Server 6.1 before 6.1.0.64-ISS-ITDS-IF0064, 6.2 before 6.2.0.39-ISS-ITDS-FP0039, and 6.3 before 6.3.0.33-ISS-ITDS-IF0033, and IBM Security Directory Server 6.3.1 before 6.3.1.7-ISS-ISDS-IF0007, allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en la interfaz del usuario de administraci\u00f3n en IBM Tivoli Directory Server 6.1 anterior a 6.1.0.64-ISS-ITDS-IF0064, 6.2 anterior a 6.2.0.39-ISS-ITDS-FP0039, y 6.3 anterior a 6.3.0.33-ISS-ITDS-IF0033, e IBM Security Directory Server 6.3.1 anterior a 6.3.1.7-ISS-ISDS-IF0007, permite a usuarios remotos autenticados inyectar secuencias de comandos web a trav\u00e9s de una URL manipulada."
    }
  ],
  "id": "CVE-2014-6100",
  "lastModified": "2024-11-21T02:13:46.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-10-19T01:55:15.717",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/61061"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-02 20:40
Modified
2024-11-21 01:17
Severity ?
Summary
The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) before 6.0.0.8-TIV-ITDS-IF0006 allows remote attackers to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC4625B-B59C-49DC-906B-6036BA2FAC5B",
              "versionEndIncluding": "6.0.0.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) before 6.0.0.8-TIV-ITDS-IF0006 allows remote attackers to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n slapi_printmessage en IBM Tivoli Directory Server (ITDS) en versiones anteriores a la 6.0.0.8-TIV-ITDS-IF0006, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante m\u00faltiples intentos de conexi\u00f3n DIGEST-MD5 incompletos."
    }
  ],
  "id": "CVE-2010-2927",
  "lastModified": "2024-11-21T01:17:40.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-02T20:40:01.607",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/66782"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40791"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/42093"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/66782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60821"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-06-30 21:41
Modified
2024-11-21 00:48
Severity ?
Summary
Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry. NOTE: the vendor states "There is no real risk of a vulnerability," although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F468434-0317-435A-B2A6-5923A88A090F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79197BC-3BDF-4F38-B63F-1B2A658B645F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D48F0B-C9E2-4381-8463-83FF47136EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36308D0C-D92C-4857-A857-097F383EE76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CEB80-796F-4928-A2A0-73E604543A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "462385FC-F345-42EE-ABF0-E1781CC648A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10F3910-5616-41A2-A3BF-18FA4DD68631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C34738-5F9B-43A7-987F-EB805B31119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA93B63-9D15-4784-8585-DBC139A382E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D84E30-1F23-4A6A-B622-78DBEEBEFB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C9A7DF-6968-41CC-911A-B746CB43AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA493E1-F791-4FE5-9F7E-36CAC0D942C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7365156-4EA3-476A-A395-FADEDF1BA80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "321B15BC-2653-4B64-A5AE-9FCA6A08713C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1B527B-E07D-4543-92A6-0EE58CB8FECC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry.  NOTE: the vendor states \"There is no real risk of a vulnerability,\" although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de doble libreaci\u00f3n en IBM Tivoli Directory Server (TDS) 6.1.0.0 hasta 6.1.0.15 que permite a los administradores la  autenticaci\u00f3n remota para causar una denegaci\u00f3n de servicios (ABEND) y posiblemente ejecutar c\u00f3dico arbitrario utilizando ldapadd para conseguir crear un duplicado en la base de datos de entrada ibm-globalAdminGroup LDAP.\r\nNOTA: el vendedor declara \"no hya un riesgo real  de vulnerabilidad\", aunque hay posibles escenarios en los que un usuario puede hacer peticiones al LDAP administrativo pero no tiene privilegios para parar el servidor"
    }
  ],
  "id": "CVE-2008-2943",
  "lastModified": "2024-11-21T00:48:04.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-30T21:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1970"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1970"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-03 22:29
Modified
2024-11-21 02:26
Summary
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection. IBM X-Force ID: 103694.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "653551D3-88A3-4E69-A1B1-64326BEF1F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48029C-3455-46A6-A8CA-8013A167979B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36D4B16-30CE-4E1F-9DCE-B06C849D5751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FBF236-512B-4CCC-A7B2-E32E47594A4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection. IBM X-Force ID: 103694."
    },
    {
      "lang": "es",
      "value": "La herramienta de administraci\u00f3n web en IBM Tivoli Security Directory Server, en versiones 6.0 anteriores a iFix 75, versiones 6.1 anteriores a iFix 68, versiones 6.2 anteriores a iFix 44 y versiones 6.3 anteriores a iFix 37 y IBM Security Directory Server, en versiones 6.3.1 anteriores a iFix 11 y 6.4 anteriores a iFix 2, permite que usuarios locales obtengan privilegios mediante vectores relacionados con una inyecci\u00f3n de argumentos. IBM X-Force ID: 103694."
    }
  ],
  "id": "CVE-2015-1975",
  "lastModified": "2024-11-21T02:26:30.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-03T22:29:00.290",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103717"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/103694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/103694"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-22 18:55
Modified
2024-11-21 01:35
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F4E54D-DA8B-46C1-A627-C8D960E1B719",
              "versionEndIncluding": "6.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4CBA738-8969-4E5F-B538-1FBFAA432A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13318848-11BC-4568-A3AF-1D1C89BF8FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C50ACBE-6F59-4985-BFA3-93CAD8E40B6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D74AC3D-DFCD-4A3A-9446-7C13C00E93A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06626F2E-605A-4AA0-839D-B035336453E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43ECBF2-8D39-469F-8D45-B2FA44B3A9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "18ABDC8A-118C-4A35-A396-1020A9469D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "38204AD1-BF0E-4521-9EE6-66214B4A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "218DD29F-18C9-489D-9273-4705BFCDE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7165C049-258B-425D-B36B-152BBF3F8727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "262F93A7-54A6-4D06-B5D1-FF6F7740044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4798A6D-E4F3-4481-B2C2-DCA4BCD97572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5E8D59-79F9-46D1-A1A7-608FA49F7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8B3BE0-2515-4CB1-B124-5462703CD32B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Director Server (TDS) v6.3 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una petici\u00f3n de b\u00fasqueda paginada LDAP mal formada."
    }
  ],
  "id": "CVE-2012-0743",
  "lastModified": "2024-11-21T01:35:38.667",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-22T18:55:03.953",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15707"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16001"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16002"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/53043"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id?1026938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026938"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:21
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon hang) via a paged search that triggers improper mutex processing.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon hang) via a paged search that triggers improper mutex processing."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.63 (tambi\u00e9n conocido como v6.0.0.8-ITV-ITDS-IF0005) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (bloqueo del demonio) a trav\u00e9s de una b\u00fasqueda paginada que activa el procesamiento de exclusi\u00f3n mutua inadecuada."
    }
  ],
  "id": "CVE-2010-4787",
  "lastModified": "2024-11-21T01:21:46.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.263",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12476"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-01-14 19:30
Modified
2024-11-21 01:11
Severity ?
Summary
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request).
Impacted products
Vendor Product Version
ibm tivoli_directory_server 6.2
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5682108-A76B-443A-A172-7F17F54B5983",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request)."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n do_extendedOp en ibmslapd  en IBM Tivoli Directory Server (TDS) v6.2  sobre Linux, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (deferencia a puntero NULL y ca\u00edda de demonio), a trav\u00e9s de un SecureWay 3.2 Event Registration Request manipulado (tambi\u00e9n conocido como  1.3.18.0.2.12.1)."
    }
  ],
  "id": "CVE-2010-0312",
  "lastModified": "2024-11-21T01:11:57.420",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-01-14T19:30:00.577",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023433"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-08 10:26
Modified
2024-11-21 01:38
Severity ?
Summary
IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDD46A9C-9DB2-4B61-BCEA-DC5AB03DCD7E",
              "versionEndIncluding": "8.0.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD561AD-2421-4AA6-B3C5-6536F6933526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:global_security_kit:7.0.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E509BA-4B47-4EDE-86DC-2E666D2D74E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0651DE7C-B8EB-4214-981B-561256C5473A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "871E249E-CB31-46A4-9E4F-274C6055C33A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate."
    },
    {
      "lang": "es",
      "value": "IBM Global Security Kit (tambi\u00e9n conocido como GSKit) anterior a v8.0.14.22, como se utiliza en IBM Directory Server Rational de IBM Tivoli Directory Server y otros productos, utiliza el formato PKCS # 12 para los objetos de archivo de certificado, sin exigir la integridad del archivo, lo que hace m\u00e1s f\u00e1cil para a atacantes remotos falsificar servidores SSL a trav\u00e9s de vectores relacionados con la inserci\u00f3n de una arbitraria ra\u00edz de Autoridad de Certificaci\u00f3n (CA) de certificados"
    }
  ],
  "id": "CVE-2012-2203",
  "lastModified": "2024-11-21T01:38:41.937",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-08T10:26:18.813",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/51279"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/54743"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/54743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 01:21
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04980717-662D-4BB1-B52E-65ED0773080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B63191-A886-445B-8DF7-DAFB60F32343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD57EC4-40A8-432F-B3B0-96941779B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "574CF7FC-A438-468B-9B4C-4355005D363F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF13A015-1EED-4BB1-97CF-84CF67A2D74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C81618-2FD8-49B1-9864-4A1C7501A162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "92805FE4-9E5A-4366-8AB9-C846A355E9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB961FA-0305-4D2B-90A1-BE63903D16AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF9F5BF-FE5A-403E-A661-04673F5390A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E857FD0-DCD1-4194-8F08-500B118088FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "460ADE05-414D-4870-A192-AA66911B71F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9DA0B9-4554-4B06-B55E-08401CFD84D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B4F0B-0801-4808-A849-466753701523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE04E834-CC79-405D-B885-C56192F0038C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11078B5-078C-4069-8288-B8A34D2635DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "58360839-9020-4567-B60B-5CBFC815E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "90BA24A5-1848-4E2B-85D5-8CDD402F27A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting."
    },
    {
      "lang": "es",
      "value": "IBM Tivoli Directory Server (TDS) v6.0 anterior a v6.0.0.63 (tambi\u00e9n conocido como v6.0.0.8-ITV-ITDS-IF0005) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda o cuelgue del demonio) a trav\u00e9s de una b\u00fasqueda paginada, como lo demuestra cierto comando idsldapsearch, relacionado con una opci\u00f3n de configuraci\u00f3n inadecuada ibm-slapdIdleTimeOut."
    }
  ],
  "id": "CVE-2010-4786",
  "lastModified": "2024-11-21T01:21:46.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:01.233",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12316"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-21 10:55
Modified
2024-11-21 00:58
Severity ?
Summary
Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
Impacted products
Vendor Product Version
ibm tivoli_directory_server 5.2.0
ibm tivoli_directory_server 5.2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A91233-1C83-487F-9BD6-6CEAE6303A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples p\u00e9rdidas de memoria en las funciones (1) ldap_init y (2) ldap_url_search_direct de la API en IBM Tivoli Directory Server (TDS) v5.2 anterior a v5.2.0.5-ITV-ITDS-LA0007 permitir a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria) por haciendo muchas llamadas de funci\u00f3n."
    }
  ],
  "id": "CVE-2008-7287",
  "lastModified": "2024-11-21T00:58:44.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-21T10:55:00.920",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09650"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09650"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2008-7288
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-17 01:17
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote attackers to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.193Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO09666",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09666"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg2402966"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote attackers to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO09666",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09666"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg2402966"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7288",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote attackers to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO09666",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09666"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg2402966",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg2402966"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7288",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-17T01:17:02.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0743
Vulnerability from cvelistv5
Published
2012-04-22 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request.
References
http://www.securitytracker.com/id?1026938vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21591267x_refsource_CONFIRM
http://www.ibm.com/support/docview.wss?uid=swg1IO16001vendor-advisory, x_refsource_AIXAPAR
http://www.securityfocus.com/bid/53043vdb-entry, x_refsource_BID
http://www.ibm.com/support/docview.wss?uid=swg1IO16002vendor-advisory, x_refsource_AIXAPAR
http://www.ibm.com/support/docview.wss?uid=swg1IO15707vendor-advisory, x_refsource_AIXAPAR
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:13.985Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1026938",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026938"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267"
          },
          {
            "name": "IO16001",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16001"
          },
          {
            "name": "53043",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53043"
          },
          {
            "name": "IO16002",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16002"
          },
          {
            "name": "IO15707",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15707"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T19:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "1026938",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026938"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267"
        },
        {
          "name": "IO16001",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16001"
        },
        {
          "name": "53043",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53043"
        },
        {
          "name": "IO16002",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16002"
        },
        {
          "name": "IO15707",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15707"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-0743",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1026938",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026938"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591267"
            },
            {
              "name": "IO16001",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16001"
            },
            {
              "name": "53043",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53043"
            },
            {
              "name": "IO16002",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16002"
            },
            {
              "name": "IO15707",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15707"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-0743",
    "datePublished": "2012-04-22T18:00:00",
    "dateReserved": "2012-01-17T00:00:00",
    "dateUpdated": "2024-08-06T18:38:13.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1972
Vulnerability from cvelistv5
Published
2015-06-28 15:00
Modified
2024-08-06 05:02
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request.
References
http://www.securitytracker.com/id/1032734vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21960659x_refsource_CONFIRM
http://www.securityfocus.com/bid/75441vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:43.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          },
          {
            "name": "75441",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75441"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "1032734",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        },
        {
          "name": "75441",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75441"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1972",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032734",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032734"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            },
            {
              "name": "75441",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75441"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1972",
    "datePublished": "2015-06-28T15:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:43.303Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4786
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-17 01:20
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.042Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          },
          {
            "name": "IO12316",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12316"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        },
        {
          "name": "IO12316",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12316"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4786",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            },
            {
              "name": "IO12316",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12316"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4786",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-17T01:20:59.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1959
Vulnerability from cvelistv5
Published
2015-06-28 15:00
Modified
2024-08-06 05:02
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action.
References
http://www.securitytracker.com/id/1032734vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21960659x_refsource_CONFIRM
http://www.securityfocus.com/bid/75442vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:43.424Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          },
          {
            "name": "75442",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "1032734",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        },
        {
          "name": "75442",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1959",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not properly restrict encrypted files, which allows local users to obtain sensitive information or possibly have unspecified other impact via a (1) download or (2) upload action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032734",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032734"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            },
            {
              "name": "75442",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1959",
    "datePublished": "2015-06-28T15:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:43.424Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0726
Vulnerability from cvelistv5
Published
2012-04-22 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:13.444Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO15761",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15761"
          },
          {
            "name": "tds-nullcipher-weak-security(74303)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74303"
          },
          {
            "name": "1026939",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026939"
          },
          {
            "name": "IO16036",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16036"
          },
          {
            "name": "53043",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272"
          },
          {
            "name": "IO16035",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16035"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T19:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "IO15761",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15761"
        },
        {
          "name": "tds-nullcipher-weak-security(74303)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74303"
        },
        {
          "name": "1026939",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026939"
        },
        {
          "name": "IO16036",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16036"
        },
        {
          "name": "53043",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272"
        },
        {
          "name": "IO16035",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16035"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-0726",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO15761",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO15761"
            },
            {
              "name": "tds-nullcipher-weak-security(74303)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74303"
            },
            {
              "name": "1026939",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026939"
            },
            {
              "name": "IO16036",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16036"
            },
            {
              "name": "53043",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53043"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591272"
            },
            {
              "name": "IO16035",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16035"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-0726",
    "datePublished": "2012-04-22T18:00:00",
    "dateReserved": "2012-01-17T00:00:00",
    "dateUpdated": "2024-08-06T18:38:13.444Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-2943
Vulnerability from cvelistv5
Published
2008-06-30 21:00
Modified
2024-08-07 09:21
Severity ?
Summary
Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry. NOTE: the vendor states "There is no real risk of a vulnerability," although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/43465vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2008/1970vdb-entry, x_refsource_VUPEN
http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113vendor-advisory, x_refsource_AIXAPAR
http://www.securityfocus.com/bid/30010vdb-entry, x_refsource_BID
http://secunia.com/advisories/30786third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:21:34.486Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "tivoli-directory-ldapadd-dos(43465)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
          },
          {
            "name": "ADV-2008-1970",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1970"
          },
          {
            "name": "IO09113",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
          },
          {
            "name": "30010",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30010"
          },
          {
            "name": "30786",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30786"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry.  NOTE: the vendor states \"There is no real risk of a vulnerability,\" although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "tivoli-directory-ldapadd-dos(43465)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
        },
        {
          "name": "ADV-2008-1970",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1970"
        },
        {
          "name": "IO09113",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
        },
        {
          "name": "30010",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30010"
        },
        {
          "name": "30786",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30786"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2943",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 6.1.0.0 through 6.1.0.15 allows remote authenticated administrators to cause a denial of service (ABEND) and possibly execute arbitrary code by using ldapadd to attempt to create a duplicate ibm-globalAdminGroup LDAP database entry.  NOTE: the vendor states \"There is no real risk of a vulnerability,\" although there are likely scenarios in which a user is allowed to make administrative LDAP requests but does not have the privileges to stop the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "tivoli-directory-ldapadd-dos(43465)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43465"
            },
            {
              "name": "ADV-2008-1970",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1970"
            },
            {
              "name": "IO09113",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IO09113"
            },
            {
              "name": "30010",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30010"
            },
            {
              "name": "30786",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30786"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2943",
    "datePublished": "2008-06-30T21:00:00",
    "dateReserved": "2008-06-30T00:00:00",
    "dateUpdated": "2024-08-07T09:21:34.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-7289
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 18:33
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 does not properly handle the simultaneous changing of multiple passwords, which makes it easier for remote authenticated users to cause a denial of service (DB2 daemon deadlock) by making password changes that trigger updates to a DB2 password-history table.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.631Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO09667",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09667"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 does not properly handle the simultaneous changing of multiple passwords, which makes it easier for remote authenticated users to cause a denial of service (DB2 daemon deadlock) by making password changes that trigger updates to a DB2 password-history table."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO09667",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09667"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7289",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 does not properly handle the simultaneous changing of multiple passwords, which makes it easier for remote authenticated users to cause a denial of service (DB2 daemon deadlock) by making password changes that trigger updates to a DB2 password-history table."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO09667",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09667"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7289",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T18:33:46.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-3089
Vulnerability from cvelistv5
Published
2009-09-08 18:00
Modified
2024-09-16 16:42
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via unspecified vectors, related to (1) the ibmslapd.exe daemon on Windows and (2) the ibmdiradm daemon in the administration server on Linux, as demonstrated by certain modules in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2006-0717. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
References
http://secunia.com/advisories/36565third-party-advisory, x_refsource_SECUNIA
http://intevydis.com/vd-list.shtmlx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:56.154Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36565",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36565"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://intevydis.com/vd-list.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via unspecified vectors, related to (1) the ibmslapd.exe daemon on Windows and (2) the ibmdiradm daemon in the administration server on Linux, as demonstrated by certain modules in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2006-0717.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-08T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "36565",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36565"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://intevydis.com/vd-list.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3089",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via unspecified vectors, related to (1) the ibmslapd.exe daemon on Windows and (2) the ibmdiradm daemon in the administration server on Linux, as demonstrated by certain modules in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2006-0717.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36565",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36565"
            },
            {
              "name": "http://intevydis.com/vd-list.shtml",
              "refsource": "MISC",
              "url": "http://intevydis.com/vd-list.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3089",
    "datePublished": "2009-09-08T18:00:00Z",
    "dateReserved": "2009-09-08T00:00:00Z",
    "dateUpdated": "2024-09-16T16:42:54.192Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0740
Vulnerability from cvelistv5
Published
2012-04-22 18:00
Modified
2024-08-06 18:38
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:13.440Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290"
          },
          {
            "name": "IO16016",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16016"
          },
          {
            "name": "1026880",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026880"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291"
          },
          {
            "name": "IO14508",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14508"
          },
          {
            "name": "tds-wat-xss(74610)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74610"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T19:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290"
        },
        {
          "name": "IO16016",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16016"
        },
        {
          "name": "1026880",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026880"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291"
        },
        {
          "name": "IO14508",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14508"
        },
        {
          "name": "tds-wat-xss(74610)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74610"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-0740",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032290"
            },
            {
              "name": "IO16016",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO16016"
            },
            {
              "name": "1026880",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026880"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032291"
            },
            {
              "name": "IO14508",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14508"
            },
            {
              "name": "tds-wat-xss(74610)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74610"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-0740",
    "datePublished": "2012-04-22T18:00:00",
    "dateReserved": "2012-01-17T00:00:00",
    "dateUpdated": "2024-08-06T18:38:13.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1820
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-08-06 22:37
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.825Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
          },
          {
            "name": "44184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44184"
          },
          {
            "name": "IO14025",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025"
          },
          {
            "name": "IO14044",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
          },
          {
            "name": "IO14023",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023"
          },
          {
            "name": "IO14043",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
          },
          {
            "name": "IO14028",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028"
          },
          {
            "name": "1025358",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025358"
          },
          {
            "name": "ibm-tds-proxyserver-info-disclosure(66712)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
        },
        {
          "name": "44184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44184"
        },
        {
          "name": "IO14025",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025"
        },
        {
          "name": "IO14044",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
        },
        {
          "name": "IO14023",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023"
        },
        {
          "name": "IO14043",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
        },
        {
          "name": "IO14028",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028"
        },
        {
          "name": "1025358",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025358"
        },
        {
          "name": "ibm-tds-proxyserver-info-disclosure(66712)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1820",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029659",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
            },
            {
              "name": "44184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44184"
            },
            {
              "name": "IO14025",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025"
            },
            {
              "name": "IO14044",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029660",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
            },
            {
              "name": "IO14023",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023"
            },
            {
              "name": "IO14043",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029661",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
            },
            {
              "name": "IO14028",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028"
            },
            {
              "name": "1025358",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1025358"
            },
            {
              "name": "ibm-tds-proxyserver-info-disclosure(66712)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg21496086",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1820",
    "datePublished": "2011-04-21T10:00:00",
    "dateReserved": "2011-04-20T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.825Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-0312
Vulnerability from cvelistv5
Published
2010-01-14 19:00
Modified
2024-09-16 16:42
Severity ?
Summary
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:45:11.880Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html"
          },
          {
            "name": "1023433",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023433"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-01-14T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html"
        },
        {
          "name": "1023433",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023433"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-0312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html",
              "refsource": "MISC",
              "url": "http://intevydis.blogspot.com/2010/01/tivoli-directory-server-62-doextendedop.html"
            },
            {
              "name": "1023433",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023433"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-0312",
    "datePublished": "2010-01-14T19:00:00Z",
    "dateReserved": "2010-01-14T00:00:00Z",
    "dateUpdated": "2024-09-16T16:42:43.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-7290
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 17:59
Severity ?
Summary
Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.732Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO09680",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09680"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO09680",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09680"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7290",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO09680",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09680"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7290",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T17:59:50.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4788
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 17:42
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) does not perform certain locking of linked-list access, which allows remote authenticated users to cause a denial of service (daemon crash) via a paged search.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          },
          {
            "name": "IO11943",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11943"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) does not perform certain locking of linked-list access, which allows remote authenticated users to cause a denial of service (daemon crash) via a paged search."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        },
        {
          "name": "IO11943",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11943"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4788",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) does not perform certain locking of linked-list access, which allows remote authenticated users to cause a denial of service (daemon crash) via a paged search."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            },
            {
              "name": "IO11943",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11943"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4788",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T17:42:45.209Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4787
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 19:51
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon hang) via a paged search that triggers improper mutex processing.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:28.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO12476",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12476"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon hang) via a paged search that triggers improper mutex processing."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO12476",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12476"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4787",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon hang) via a paged search that triggers improper mutex processing."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO12476",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO12476"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4787",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T19:51:04.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4785
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 19:35
Severity ?
Summary
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:28.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO11814",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11814"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO11814",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11814"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4785",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO11814",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11814"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4785",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T19:35:00.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4216
Vulnerability from cvelistv5
Published
2010-11-09 20:00
Modified
2024-08-07 03:34
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 does not properly handle invalid buffer references in LDAP BER requests, which might allow remote attackers to cause a denial of service (daemon crash) via vectors involving a buffer that has a memory address near the maximum possible address.
References
http://www.securityfocus.com/bid/44604vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/62977vdb-entry, x_refsource_XF
http://www.ibm.com/support/docview.wss?uid=swg1IO13306vendor-advisory, x_refsource_AIXAPAR
http://secunia.com/advisories/42116third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/2863vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:34:37.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "44604",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44604"
          },
          {
            "name": "ibm-tds-ber-ldap-dos(62977)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
          },
          {
            "name": "IO13306",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
          },
          {
            "name": "42116",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42116"
          },
          {
            "name": "ADV-2010-2863",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2863"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 does not properly handle invalid buffer references in LDAP BER requests, which might allow remote attackers to cause a denial of service (daemon crash) via vectors involving a buffer that has a memory address near the maximum possible address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "44604",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44604"
        },
        {
          "name": "ibm-tds-ber-ldap-dos(62977)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
        },
        {
          "name": "IO13306",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
        },
        {
          "name": "42116",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42116"
        },
        {
          "name": "ADV-2010-2863",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2863"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4216",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 does not properly handle invalid buffer references in LDAP BER requests, which might allow remote attackers to cause a denial of service (daemon crash) via vectors involving a buffer that has a memory address near the maximum possible address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "44604",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/44604"
            },
            {
              "name": "ibm-tds-ber-ldap-dos(62977)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
            },
            {
              "name": "IO13306",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
            },
            {
              "name": "42116",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42116"
            },
            {
              "name": "ADV-2010-2863",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2863"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4216",
    "datePublished": "2010-11-09T20:00:00",
    "dateReserved": "2010-11-09T00:00:00",
    "dateUpdated": "2024-08-07T03:34:37.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-0138
Vulnerability from cvelistv5
Published
2015-03-25 01:00
Modified
2024-08-06 04:03
Severity ?
Summary
GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:03:09.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2015:1007",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
          },
          {
            "name": "73326",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/73326"
          },
          {
            "name": "RHSA-2015:1006",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
          },
          {
            "name": "RHSA-2015:1091",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
          },
          {
            "name": "SUSE-SU-2015:1138",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
          },
          {
            "name": "RHSA-2015:1020",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
          },
          {
            "name": "SUSE-SU-2015:1086",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
          },
          {
            "name": "SUSE-SU-2015:1085",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
          },
          {
            "name": "RHSA-2015:1021",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
          },
          {
            "name": "SUSE-SU-2015:1073",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
          },
          {
            "name": "SUSE-SU-2015:1161",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the \"FREAK\" issue, a different vulnerability than CVE-2015-0204."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-30T15:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "RHSA-2015:1007",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
        },
        {
          "name": "73326",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/73326"
        },
        {
          "name": "RHSA-2015:1006",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
        },
        {
          "name": "RHSA-2015:1091",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
        },
        {
          "name": "SUSE-SU-2015:1138",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
        },
        {
          "name": "RHSA-2015:1020",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
        },
        {
          "name": "SUSE-SU-2015:1086",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
        },
        {
          "name": "SUSE-SU-2015:1085",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
        },
        {
          "name": "RHSA-2015:1021",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
        },
        {
          "name": "SUSE-SU-2015:1073",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
        },
        {
          "name": "SUSE-SU-2015:1161",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-0138",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the \"FREAK\" issue, a different vulnerability than CVE-2015-0204."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2015:1007",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
            },
            {
              "name": "73326",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/73326"
            },
            {
              "name": "RHSA-2015:1006",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
            },
            {
              "name": "RHSA-2015:1091",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
            },
            {
              "name": "SUSE-SU-2015:1138",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
            },
            {
              "name": "RHSA-2015:1020",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
            },
            {
              "name": "SUSE-SU-2015:1086",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
            },
            {
              "name": "SUSE-SU-2015:1085",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
            },
            {
              "name": "RHSA-2015:1021",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
            },
            {
              "name": "SUSE-SU-2015:1073",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
            },
            {
              "name": "SUSE-SU-2015:1161",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-0138",
    "datePublished": "2015-03-25T01:00:00",
    "dateReserved": "2014-11-18T00:00:00",
    "dateUpdated": "2024-08-06T04:03:09.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1978
Vulnerability from cvelistv5
Published
2015-06-28 15:00
Modified
2024-08-06 05:02
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
http://www.securitytracker.com/id/1032734vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21960659x_refsource_CONFIRM
http://www.securityfocus.com/bid/75435vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.801Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          },
          {
            "name": "75435",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75435"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "1032734",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        },
        {
          "name": "75435",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75435"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1978",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032734",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032734"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            },
            {
              "name": "75435",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75435"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1978",
    "datePublished": "2015-06-28T15:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.801Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1822
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 16:38
Severity ?
Summary
The LDAP_ADD implementation in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0009 stores a cleartext SHA password in the change log, which might allow local users to obtain sensitive information by reading this log.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.822Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO11882",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The LDAP_ADD implementation in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0009 stores a cleartext SHA password in the change log, which might allow local users to obtain sensitive information by reading this log."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO11882",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1822",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The LDAP_ADD implementation in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0009 stores a cleartext SHA password in the change log, which might allow local users to obtain sensitive information by reading this log."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO11882",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11882"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1822",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T16:38:52.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1821
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 19:47
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO13000",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13000"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO13000",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13000"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1821",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO13000",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13000"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1821",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T19:47:00.343Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6747
Vulnerability from cvelistv5
Published
2014-01-27 16:00
Modified
2024-08-06 17:46
Severity ?
Summary
IBM GSKit 7.x before 7.0.4.48 and 8.x before 8.0.50.16, as used in IBM Security Directory Server (ISDS) and Tivoli Directory Server (TDS), allows remote attackers to cause a denial of service (application crash or hang) via a malformed X.509 certificate chain.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:23.659Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-gskit-cve20136747-cert-chain(89863)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89863"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
          },
          {
            "name": "56698",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56698"
          },
          {
            "name": "102556",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102556"
          },
          {
            "name": "56699",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56699"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
          },
          {
            "name": "1029687",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029687"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM GSKit 7.x before 7.0.4.48 and 8.x before 8.0.50.16, as used in IBM Security Directory Server (ISDS) and Tivoli Directory Server (TDS), allows remote attackers to cause a denial of service (application crash or hang) via a malformed X.509 certificate chain."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-gskit-cve20136747-cert-chain(89863)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89863"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
        },
        {
          "name": "56698",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56698"
        },
        {
          "name": "102556",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102556"
        },
        {
          "name": "56699",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56699"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
        },
        {
          "name": "1029687",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029687"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2013-6747",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM GSKit 7.x before 7.0.4.48 and 8.x before 8.0.50.16, as used in IBM Security Directory Server (ISDS) and Tivoli Directory Server (TDS), allows remote attackers to cause a denial of service (application crash or hang) via a malformed X.509 certificate chain."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-gskit-cve20136747-cert-chain(89863)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89863"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
            },
            {
              "name": "56698",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56698"
            },
            {
              "name": "102556",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102556"
            },
            {
              "name": "56699",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56699"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21662902"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
            },
            {
              "name": "1029687",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029687"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2013-6747",
    "datePublished": "2014-01-27T16:00:00",
    "dateReserved": "2013-11-08T00:00:00",
    "dateUpdated": "2024-08-06T17:46:23.659Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2758
Vulnerability from cvelistv5
Published
2011-07-17 20:00
Modified
2024-09-16 22:08
Severity ?
Summary
IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not require authentication for access to LDAP Server log files, which allows remote attackers to obtain sensitive information via a crafted URL.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "45107",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45107"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
          },
          {
            "name": "IO14060",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14060"
          },
          {
            "name": "48512",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48512"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not require authentication for access to LDAP Server log files, which allows remote attackers to obtain sensitive information via a crafted URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-07-17T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "45107",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45107"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
        },
        {
          "name": "IO14060",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14060"
        },
        {
          "name": "48512",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48512"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2758",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not require authentication for access to LDAP Server log files, which allows remote attackers to obtain sensitive information via a crafted URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "45107",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45107"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24030320",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
            },
            {
              "name": "IO14060",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14060"
            },
            {
              "name": "48512",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48512"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14060"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2758",
    "datePublished": "2011-07-17T20:00:00Z",
    "dateReserved": "2011-07-17T00:00:00Z",
    "dateUpdated": "2024-09-16T22:08:50.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-2927
Vulnerability from cvelistv5
Published
2010-08-02 19:00
Modified
2024-08-07 02:46
Severity ?
Summary
The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) before 6.0.0.8-TIV-ITDS-IF0006 allows remote attackers to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts.
References
http://www-01.ibm.com/support/docview.wss?uid=swg24027463x_refsource_CONFIRM
http://osvdb.org/66782vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/60821vdb-entry, x_refsource_XF
http://secunia.com/advisories/40791third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/42093vdb-entry, x_refsource_BID
http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399vendor-advisory, x_refsource_AIXAPAR
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463"
          },
          {
            "name": "66782",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/66782"
          },
          {
            "name": "ibm-tds-digestmd5-dos(60821)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60821"
          },
          {
            "name": "40791",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40791"
          },
          {
            "name": "42093",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42093"
          },
          {
            "name": "IO12399",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) before 6.0.0.8-TIV-ITDS-IF0006 allows remote attackers to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463"
        },
        {
          "name": "66782",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/66782"
        },
        {
          "name": "ibm-tds-digestmd5-dos(60821)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60821"
        },
        {
          "name": "40791",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40791"
        },
        {
          "name": "42093",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42093"
        },
        {
          "name": "IO12399",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2927",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) before 6.0.0.8-TIV-ITDS-IF0006 allows remote attackers to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24027463"
            },
            {
              "name": "66782",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/66782"
            },
            {
              "name": "ibm-tds-digestmd5-dos(60821)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60821"
            },
            {
              "name": "40791",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40791"
            },
            {
              "name": "42093",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42093"
            },
            {
              "name": "IO12399",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO12399"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2927",
    "datePublished": "2010-08-02T19:00:00",
    "dateReserved": "2010-08-02T00:00:00",
    "dateUpdated": "2024-08-07T02:46:48.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5072
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 16:17
Severity ?
Summary
Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.031Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO11407",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11407"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO11407",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11407"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5072",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO11407",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO11407"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5072",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T16:17:55.713Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1974
Vulnerability from cvelistv5
Published
2015-06-28 15:00
Modified
2024-08-06 05:02
Severity ?
Summary
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors.
References
http://www.securityfocus.com/bid/75438vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1032734vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21960659x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.766Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "75438",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75438"
          },
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "75438",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75438"
        },
        {
          "name": "1032734",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1974",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "75438",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75438"
            },
            {
              "name": "1032734",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032734"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1974",
    "datePublished": "2015-06-28T15:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-0717
Vulnerability from cvelistv5
Published
2006-02-15 11:00
Modified
2024-08-07 16:48
Severity ?
Summary
IBM Tivoli Directory Server 6.0 allows remote attackers to cause a denial of service (crash) via a crafted LDAP request, as demonstrated by test 2532 in the ProtoVer Sample LDAP test suite.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:55.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015653",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015653"
          },
          {
            "name": "ADV-2006-0537",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0537"
          },
          {
            "name": "tivoli-directory-ldap-dos(24619)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24619"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820"
          },
          {
            "name": "18779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18779"
          },
          {
            "name": "[Dailydave] 20060211 IBM Tivoli Directory Server 0day",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002921.html"
          },
          {
            "name": "16593",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16593"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server 6.0 allows remote attackers to cause a denial of service (crash) via a crafted LDAP request, as demonstrated by test 2532 in the ProtoVer Sample LDAP test suite."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015653",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015653"
        },
        {
          "name": "ADV-2006-0537",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0537"
        },
        {
          "name": "tivoli-directory-ldap-dos(24619)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24619"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820"
        },
        {
          "name": "18779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18779"
        },
        {
          "name": "[Dailydave] 20060211 IBM Tivoli Directory Server 0day",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002921.html"
        },
        {
          "name": "16593",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16593"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server 6.0 allows remote attackers to cause a denial of service (crash) via a crafted LDAP request, as demonstrated by test 2532 in the ProtoVer Sample LDAP test suite."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015653",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015653"
            },
            {
              "name": "ADV-2006-0537",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0537"
            },
            {
              "name": "tivoli-directory-ldap-dos(24619)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24619"
            },
            {
              "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820",
              "refsource": "CONFIRM",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21230820"
            },
            {
              "name": "18779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18779"
            },
            {
              "name": "[Dailydave] 20060211 IBM Tivoli Directory Server 0day",
              "refsource": "MLIST",
              "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002921.html"
            },
            {
              "name": "16593",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16593"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0717",
    "datePublished": "2006-02-15T11:00:00",
    "dateReserved": "2006-02-15T00:00:00",
    "dateUpdated": "2024-08-07T16:48:55.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1976
Vulnerability from cvelistv5
Published
2017-02-08 22:00
Modified
2024-08-06 05:02
Severity ?
Summary
IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.937Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90526",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90526"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg21980585"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Directory Server",
          "vendor": "IBM Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "6.1"
            },
            {
              "status": "affected",
              "version": "6.2"
            },
            {
              "status": "affected",
              "version": "6.3"
            },
            {
              "status": "affected",
              "version": "6.3.1"
            },
            {
              "status": "affected",
              "version": "6.0"
            },
            {
              "status": "affected",
              "version": "6.4"
            }
          ]
        }
      ],
      "datePublic": "2016-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-09T10:57:02",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "90526",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90526"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21980585"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1976",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Directory Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.1"
                          },
                          {
                            "version_value": "6.2"
                          },
                          {
                            "version_value": "6.3"
                          },
                          {
                            "version_value": "6.3.1"
                          },
                          {
                            "version_value": "6.0"
                          },
                          {
                            "version_value": "6.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "IBM Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Security Directory Server could allow an authenticated user to execute commands into the web administration tool that would cause the tool to crash."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90526",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90526"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg21980585",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg21980585"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1976",
    "datePublished": "2017-02-08T22:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.937Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6742
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-17 01:36
Severity ?
Summary
The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.652Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO07450",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07450"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO07450",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07450"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6742",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO07450",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07450"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6742",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-17T01:36:19.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-7287
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 18:03
Severity ?
Summary
Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.374Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO09650",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09650"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO09650",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09650"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7287",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO09650",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO09650"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7287",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T18:03:22.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-3090
Vulnerability from cvelistv5
Published
2009-09-08 18:00
Modified
2024-09-17 02:21
Severity ?
Summary
Unspecified vulnerability in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
References
http://secunia.com/advisories/36565third-party-advisory, x_refsource_SECUNIA
http://intevydis.com/vd-list.shtmlx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:56.236Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36565",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36565"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://intevydis.com/vd-list.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-08T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "36565",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36565"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://intevydis.com/vd-list.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3090",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.  NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36565",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36565"
            },
            {
              "name": "http://intevydis.com/vd-list.shtml",
              "refsource": "MISC",
              "url": "http://intevydis.com/vd-list.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3090",
    "datePublished": "2009-09-08T18:00:00Z",
    "dateReserved": "2009-09-08T00:00:00Z",
    "dateUpdated": "2024-09-17T02:21:59.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-2019
Vulnerability from cvelistv5
Published
2015-06-28 15:00
Modified
2024-08-06 05:02
Severity ?
Summary
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation.
References
http://www.securitytracker.com/id/1032734vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg21960659x_refsource_CONFIRM
http://www.securityfocus.com/bid/75437vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.976Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          },
          {
            "name": "75437",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75437"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "1032734",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        },
        {
          "name": "75437",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75437"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-2019",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032734",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032734"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            },
            {
              "name": "75437",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75437"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-2019",
    "datePublished": "2015-06-28T15:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6743
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-17 02:41
Severity ?
Summary
Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO07174",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07174"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO07174",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07174"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6743",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO07174",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO07174"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6743",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-17T02:41:38.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4217
Vulnerability from cvelistv5
Published
2010-11-09 20:00
Modified
2024-09-16 23:56
Severity ?
Summary
Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation.
References
http://www.securityfocus.com/bid/44604vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2010/2861vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42083third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1024670vdb-entry, x_refsource_SECTRACK
http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282vendor-advisory, x_refsource_AIXAPAR
http://www.osvdb.org/68964vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/2863vdb-entry, x_refsource_VUPEN
http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364vendor-advisory, x_refsource_AIXAPAR
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:34:37.980Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "44604",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44604"
          },
          {
            "name": "ADV-2010-2861",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2861"
          },
          {
            "name": "42083",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42083"
          },
          {
            "name": "1024670",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024670"
          },
          {
            "name": "IO13282",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282"
          },
          {
            "name": "68964",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/68964"
          },
          {
            "name": "ADV-2010-2863",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2863"
          },
          {
            "name": "IO13364",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-11-09T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "44604",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44604"
        },
        {
          "name": "ADV-2010-2861",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2861"
        },
        {
          "name": "42083",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42083"
        },
        {
          "name": "1024670",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024670"
        },
        {
          "name": "IO13282",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282"
        },
        {
          "name": "68964",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/68964"
        },
        {
          "name": "ADV-2010-2863",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2863"
        },
        {
          "name": "IO13364",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "44604",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/44604"
            },
            {
              "name": "ADV-2010-2861",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2861"
            },
            {
              "name": "42083",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42083"
            },
            {
              "name": "1024670",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1024670"
            },
            {
              "name": "IO13282",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13282"
            },
            {
              "name": "68964",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/68964"
            },
            {
              "name": "ADV-2010-2863",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2863"
            },
            {
              "name": "IO13364",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IO13364"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4217",
    "datePublished": "2010-11-09T20:00:00Z",
    "dateReserved": "2010-11-09T00:00:00Z",
    "dateUpdated": "2024-09-16T23:56:59.627Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2191
Vulnerability from cvelistv5
Published
2012-08-08 10:00
Modified
2024-08-06 19:26
Severity ?
Summary
IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, does not properly validate data during execution of a protection mechanism against the Vaudenay SSL CBC timing attack, which allows remote attackers to cause a denial of service (application crash) via crafted values in the TLS Record Layer, a different vulnerability than CVE-2012-2333.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:09.007Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IV31980",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980"
          },
          {
            "name": "51279",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51279"
          },
          {
            "name": "rds-recordlayer-dos(75996)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996"
          },
          {
            "name": "54743",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54743"
          },
          {
            "name": "IV31981",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, does not properly validate data during execution of a protection mechanism against the Vaudenay SSL CBC timing attack, which allows remote attackers to cause a denial of service (application crash) via crafted values in the TLS Record Layer, a different vulnerability than CVE-2012-2333."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "IV31980",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980"
        },
        {
          "name": "51279",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51279"
        },
        {
          "name": "rds-recordlayer-dos(75996)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996"
        },
        {
          "name": "54743",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54743"
        },
        {
          "name": "IV31981",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-2191",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, does not properly validate data during execution of a protection mechanism against the Vaudenay SSL CBC timing attack, which allows remote attackers to cause a denial of service (application crash) via crafted values in the TLS Record Layer, a different vulnerability than CVE-2012-2333."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IV31980",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980"
            },
            {
              "name": "51279",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51279"
            },
            {
              "name": "rds-recordlayer-dos(75996)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996"
            },
            {
              "name": "54743",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/54743"
            },
            {
              "name": "IV31981",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-2191",
    "datePublished": "2012-08-08T10:00:00",
    "dateReserved": "2012-04-04T00:00:00",
    "dateUpdated": "2024-08-06T19:26:09.007Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4789
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 23:45
Severity ?
Summary
Use-after-free vulnerability in the proxy-server implementation in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.65 (aka 6.0.0.8-TIV-ITDS-IF0007) and 6.3 before 6.3.0.1 (aka 6.3.0.0-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (daemon crash) via a paged search that is interrupted by an LDAP Unbind operation.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.038Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
          },
          {
            "name": "IO13364",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13364"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          },
          {
            "name": "IO13451",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13451"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in the proxy-server implementation in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.65 (aka 6.0.0.8-TIV-ITDS-IF0007) and 6.3 before 6.3.0.1 (aka 6.3.0.0-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (daemon crash) via a paged search that is interrupted by an LDAP Unbind operation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
        },
        {
          "name": "IO13364",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13364"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        },
        {
          "name": "IO13451",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13451"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4789",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in the proxy-server implementation in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.65 (aka 6.0.0.8-TIV-ITDS-IF0007) and 6.3 before 6.3.0.1 (aka 6.3.0.0-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (daemon crash) via a paged search that is interrupted by an LDAP Unbind operation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029659",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
            },
            {
              "name": "IO13364",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13364"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            },
            {
              "name": "IO13451",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13451"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4789",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T23:45:57.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1206
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-08-06 22:21
Severity ?
Summary
Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:21:34.108Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
          },
          {
            "name": "44184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
          },
          {
            "name": "IO14013",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14013"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          },
          {
            "name": "ibm-tds-ibmslapd-bo(66711)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66711"
          },
          {
            "name": "IO14045",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14045"
          },
          {
            "name": "IO14010",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14010"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
          },
          {
            "name": "1025358",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025358"
          },
          {
            "name": "8213",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8213"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg21496117"
          },
          {
            "name": "IO14046",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14046"
          },
          {
            "name": "IO14009",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14009"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
        },
        {
          "name": "44184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
        },
        {
          "name": "IO14013",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14013"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        },
        {
          "name": "ibm-tds-ibmslapd-bo(66711)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66711"
        },
        {
          "name": "IO14045",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14045"
        },
        {
          "name": "IO14010",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14010"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
        },
        {
          "name": "1025358",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025358"
        },
        {
          "name": "8213",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8213"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21496117"
        },
        {
          "name": "IO14046",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14046"
        },
        {
          "name": "IO14009",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14009"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1206",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029659",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659"
            },
            {
              "name": "44184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44184"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029660",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660"
            },
            {
              "name": "IO14013",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14013"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            },
            {
              "name": "ibm-tds-ibmslapd-bo(66711)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66711"
            },
            {
              "name": "IO14045",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14045"
            },
            {
              "name": "IO14010",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14010"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029661",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661"
            },
            {
              "name": "1025358",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1025358"
            },
            {
              "name": "8213",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8213"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg21496117",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg21496117"
            },
            {
              "name": "IO14046",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14046"
            },
            {
              "name": "IO14009",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14009"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1206",
    "datePublished": "2011-04-21T10:00:00",
    "dateReserved": "2011-03-03T00:00:00",
    "dateUpdated": "2024-08-06T22:21:34.108Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-6100
Vulnerability from cvelistv5
Published
2014-10-19 01:00
Modified
2024-08-06 12:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Admin UI in IBM Tivoli Directory Server 6.1 before 6.1.0.64-ISS-ITDS-IF0064, 6.2 before 6.2.0.39-ISS-ITDS-FP0039, and 6.3 before 6.3.0.33-ISS-ITDS-IF0033, and IBM Security Directory Server 6.3.1 before 6.3.1.7-ISS-ISDS-IF0007, allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/96005vdb-entry, x_refsource_XF
http://www-01.ibm.com/support/docview.wss?uid=swg21686581x_refsource_CONFIRM
http://secunia.com/advisories/61061third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:03:02.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-sds-cve20146100-xss(96005)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581"
          },
          {
            "name": "61061",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61061"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Admin UI in IBM Tivoli Directory Server 6.1 before 6.1.0.64-ISS-ITDS-IF0064, 6.2 before 6.2.0.39-ISS-ITDS-FP0039, and 6.3 before 6.3.0.33-ISS-ITDS-IF0033, and IBM Security Directory Server 6.3.1 before 6.3.1.7-ISS-ISDS-IF0007, allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-sds-cve20146100-xss(96005)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581"
        },
        {
          "name": "61061",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61061"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-6100",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Admin UI in IBM Tivoli Directory Server 6.1 before 6.1.0.64-ISS-ITDS-IF0064, 6.2 before 6.2.0.39-ISS-ITDS-FP0039, and 6.3 before 6.3.0.33-ISS-ITDS-IF0033, and IBM Security Directory Server 6.3.1 before 6.3.1.7-ISS-ISDS-IF0007, allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-sds-cve20146100-xss(96005)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581"
            },
            {
              "name": "61061",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61061"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-6100",
    "datePublished": "2014-10-19T01:00:00",
    "dateReserved": "2014-09-02T00:00:00",
    "dateUpdated": "2024-08-06T12:03:02.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1975
Vulnerability from cvelistv5
Published
2018-04-03 22:00
Modified
2024-08-06 05:02
Severity ?
Summary
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection. IBM X-Force ID: 103694.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.778Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-sds-cve20151975-arg-injection(103694)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/103694"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
          },
          {
            "name": "103717",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103717"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection. IBM X-Force ID: 103694."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-12T09:57:02",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-sds-cve20151975-arg-injection(103694)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/103694"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
        },
        {
          "name": "103717",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103717"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1975",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, and 6.3 before iFix 37 and IBM Security Directory Server 6.3.1 before iFix 11 and 6.4 before iFix 2 allows local users to gain privileges via vectors related to argument injection. IBM X-Force ID: 103694."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-sds-cve20151975-arg-injection(103694)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/103694"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
            },
            {
              "name": "103717",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103717"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1975",
    "datePublished": "2018-04-03T22:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-3088
Vulnerability from cvelistv5
Published
2009-09-08 18:00
Modified
2024-09-16 22:36
Severity ?
Summary
Heap-based buffer overflow in ibmdiradm in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to have an unspecified impact via unknown vectors that trigger heap corruption, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
References
http://secunia.com/advisories/36565third-party-advisory, x_refsource_SECUNIA
http://intevydis.com/vd-list.shtmlx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:55.814Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36565",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36565"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://intevydis.com/vd-list.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in ibmdiradm in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to have an unspecified impact via unknown vectors that trigger heap corruption, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-08T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "36565",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36565"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://intevydis.com/vd-list.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in ibmdiradm in IBM Tivoli Directory Server (TDS) 6.0 on Linux allows remote attackers to have an unspecified impact via unknown vectors that trigger heap corruption, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36565",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36565"
            },
            {
              "name": "http://intevydis.com/vd-list.shtml",
              "refsource": "MISC",
              "url": "http://intevydis.com/vd-list.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3088",
    "datePublished": "2009-09-08T18:00:00Z",
    "dateReserved": "2009-09-08T00:00:00Z",
    "dateUpdated": "2024-09-16T22:36:02.531Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2203
Vulnerability from cvelistv5
Published
2012-08-08 10:00
Modified
2024-08-06 19:26
Severity ?
Summary
IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "rds-gskit-pkcs-spoofing(77280)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280"
          },
          {
            "name": "51279",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51279"
          },
          {
            "name": "IV31975",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975"
          },
          {
            "name": "54743",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54743"
          },
          {
            "name": "IV31973",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "rds-gskit-pkcs-spoofing(77280)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280"
        },
        {
          "name": "51279",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51279"
        },
        {
          "name": "IV31975",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975"
        },
        {
          "name": "54743",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54743"
        },
        {
          "name": "IV31973",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-2203",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "rds-gskit-pkcs-spoofing(77280)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280"
            },
            {
              "name": "51279",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51279"
            },
            {
              "name": "IV31975",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975"
            },
            {
              "name": "54743",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/54743"
            },
            {
              "name": "IV31973",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-2203",
    "datePublished": "2012-08-08T10:00:00",
    "dateReserved": "2012-04-04T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.924Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-2526
Vulnerability from cvelistv5
Published
2005-10-25 04:00
Modified
2024-08-08 01:29
Severity ?
Summary
Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter.
References
http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692vendor-advisory, x_refsource_AIXAPAR
http://securitytracker.com/id?1010834vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/10841vdb-entry, x_refsource_BID
http://www.osvdb.org/8367vdb-entry, x_refsource_OSVDB
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.htmlmailing-list, x_refsource_FULLDISC
http://www.oliverkarow.de/research/IDS_directory_traversal.txtx_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/16850vdb-entry, x_refsource_XF
http://secunia.com/advisories/10347third-party-advisory, x_refsource_SECUNIA
http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631vendor-advisory, x_refsource_AIXAPAR
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:13.623Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IR52692",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692"
          },
          {
            "name": "1010834",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1010834"
          },
          {
            "name": "10841",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10841"
          },
          {
            "name": "8367",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/8367"
          },
          {
            "name": "20040802 IBM Directory Server - ldacgi.exe",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt"
          },
          {
            "name": "tivoli-directory-directory-traversal(16850)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16850"
          },
          {
            "name": "10347",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10347"
          },
          {
            "name": "IR53631",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-08-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IR52692",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692"
        },
        {
          "name": "1010834",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1010834"
        },
        {
          "name": "10841",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10841"
        },
        {
          "name": "8367",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/8367"
        },
        {
          "name": "20040802 IBM Directory Server - ldacgi.exe",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt"
        },
        {
          "name": "tivoli-directory-directory-traversal(16850)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16850"
        },
        {
          "name": "10347",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10347"
        },
        {
          "name": "IR53631",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2526",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IR52692",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692"
            },
            {
              "name": "1010834",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1010834"
            },
            {
              "name": "10841",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10841"
            },
            {
              "name": "8367",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/8367"
            },
            {
              "name": "20040802 IBM Directory Server - ldacgi.exe",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html"
            },
            {
              "name": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt",
              "refsource": "MISC",
              "url": "http://www.oliverkarow.de/research/IDS_directory_traversal.txt"
            },
            {
              "name": "tivoli-directory-directory-traversal(16850)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16850"
            },
            {
              "name": "10347",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10347"
            },
            {
              "name": "IR53631",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2526",
    "datePublished": "2005-10-25T04:00:00",
    "dateReserved": "2005-10-25T00:00:00",
    "dateUpdated": "2024-08-08T01:29:13.623Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-3567
Vulnerability from cvelistv5
Published
2005-11-16 07:37
Modified
2024-08-07 23:17
Severity ?
Summary
slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:17:23.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17484",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17484"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247"
          },
          {
            "name": "IO02714",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02714\u0026apar=only"
          },
          {
            "name": "ADV-2005-2356",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2356"
          },
          {
            "name": "VU#194753",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/194753"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159"
          },
          {
            "name": "15367",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15367"
          },
          {
            "name": "20672",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20672"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en"
          },
          {
            "name": "1015171",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015171"
          },
          {
            "name": "IO02697",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02697\u0026apar=only"
          },
          {
            "name": "tivoli-directory-bypass-security(22989)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17484",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17484"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247"
        },
        {
          "name": "IO02714",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02714\u0026apar=only"
        },
        {
          "name": "ADV-2005-2356",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2356"
        },
        {
          "name": "VU#194753",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/194753"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159"
        },
        {
          "name": "15367",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15367"
        },
        {
          "name": "20672",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20672"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en"
        },
        {
          "name": "1015171",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015171"
        },
        {
          "name": "IO02697",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02697\u0026apar=only"
        },
        {
          "name": "tivoli-directory-bypass-security(22989)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3567",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17484",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17484"
            },
            {
              "name": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247",
              "refsource": "CONFIRM",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247"
            },
            {
              "name": "IO02714",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02714\u0026apar=only"
            },
            {
              "name": "ADV-2005-2356",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2356"
            },
            {
              "name": "VU#194753",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/194753"
            },
            {
              "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159",
              "refsource": "CONFIRM",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159"
            },
            {
              "name": "15367",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15367"
            },
            {
              "name": "20672",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20672"
            },
            {
              "name": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en",
              "refsource": "CONFIRM",
              "url": "http://www-1.ibm.com/support/docview.wss?rs=767\u0026context=SSVJJU\u0026dc=D400\u0026uid=swg24010819\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en"
            },
            {
              "name": "1015171",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015171"
            },
            {
              "name": "IO02697",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IO02697\u0026apar=only"
            },
            {
              "name": "tivoli-directory-bypass-security(22989)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3567",
    "datePublished": "2005-11-16T07:37:00",
    "dateReserved": "2005-11-16T00:00:00",
    "dateUpdated": "2024-08-07T23:17:23.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2759
Vulnerability from cvelistv5
Published
2011-07-17 20:00
Modified
2024-08-06 23:08
Severity ?
Summary
The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO14165",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
          },
          {
            "name": "ibm-tds-idswebapp-info-disc(68585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO14165",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
        },
        {
          "name": "ibm-tds-idswebapp-info-disc(68585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2759",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO14165",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24030320",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
            },
            {
              "name": "ibm-tds-idswebapp-info-disc(68585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?crawler=1\u0026uid=swg1IO14165"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2759",
    "datePublished": "2011-07-17T20:00:00",
    "dateReserved": "2011-07-17T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5073
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-09-16 22:40
Severity ?
Summary
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.117Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IO10802",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO10802"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "IO10802",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO10802"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5073",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka 6.0.0.8-TIV-ITDS-IF0001) allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) by adding a nested group that contains the Distinguished Name (DN) of its parent entry."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IO10802",
              "refsource": "AIXAPAR",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO10802"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5073",
    "datePublished": "2011-04-21T10:00:00Z",
    "dateReserved": "2011-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T22:40:49.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1977
Vulnerability from cvelistv5
Published
2016-07-15 18:00
Modified
2024-08-06 05:02
Severity ?
Summary
Directory traversal vulnerability in the Web Administration tool in IBM Tivoli Directory Server (ITDS) before 6.1.0.74-ISS-ISDS-IF0074, 6.2.x before 6.2.0.50-ISS-ISDS-IF0050, and 6.3.x before 6.3.0.43-ISS-ISDS-IF0043 and IBM Security Directory Server (ISDS) before 6.3.1.18-ISS-ISDS-IF0018 and 6.4.x before 6.4.0.9-ISS-ISDS-IF0009 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:02:42.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the Web Administration tool in IBM Tivoli Directory Server (ITDS) before 6.1.0.74-ISS-ISDS-IF0074, 6.2.x before 6.2.0.50-ISS-ISDS-IF0050, and 6.3.x before 6.3.0.43-ISS-ISDS-IF0043 and IBM Security Directory Server (ISDS) before 6.3.1.18-ISS-ISDS-IF0018 and 6.4.x before 6.4.0.9-ISS-ISDS-IF0009 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-07-15T17:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2015-1977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the Web Administration tool in IBM Tivoli Directory Server (ITDS) before 6.1.0.74-ISS-ISDS-IF0074, 6.2.x before 6.2.0.50-ISS-ISDS-IF0050, and 6.3.x before 6.3.0.43-ISS-ISDS-IF0043 and IBM Security Directory Server (ISDS) before 6.3.1.18-ISS-ISDS-IF0018 and 6.4.x before 6.4.0.9-ISS-ISDS-IF0009 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986452"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2015-1977",
    "datePublished": "2016-07-15T18:00:00",
    "dateReserved": "2015-02-19T00:00:00",
    "dateUpdated": "2024-08-06T05:02:42.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}