CVE-2015-5016 (GCVE-0-2015-5016)
Vulnerability from cvelistv5 – Published: 2018-03-27 17:00 – Updated: 2024-08-06 06:32
VLAI?
Summary
IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:32:31.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ibm-maximo-cve20155016-info-disc(106460)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/106460"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971160"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-02-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-03-27T16:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"name": "ibm-maximo-cve20155016-info-disc(106460)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/106460"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971160"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-5016",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ibm-maximo-cve20155016-info-disc(106460)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/106460"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21971160",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971160"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2015-5016",
"datePublished": "2018-03-27T17:00:00",
"dateReserved": "2015-06-24T00:00:00",
"dateUpdated": "2024-08-06T06:32:31.899Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE721CF9-0F75-410B-A0F4-542041E25925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AEBAE48-FFD0-4837-AB3B-F6C31B1AC8D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58B773C7-9386-4704-B85F-748578DBC242\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85457F6C-80FE-4E9F-BAB6-58B0485D8B7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"598EAB6C-7D41-46FE-BB32-D31014CA01D6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_energy_optimization:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47FE69C7-D7C4-4707-B3EF-AC290F2CF92D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_aviation:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBC96757-682F-4EBF-83A7-7C85C451ED26\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_government:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D8673B0-D385-467A-A60C-90A436C976D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_government:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4908AC9D-7410-47A6-BC46-5587C60061A2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4796CF9E-0065-4DE2-8C7A-22EB76F65E8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75C69BA7-055F-446B-9E76-398D57680BA0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_transportation:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F780ADF-3151-4B2C-98B9-7FFD0DB47A57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_transportation:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4367602D-5736-459D-82C1-099CD484F2FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_transportation:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7759191C-5D16-4937-BC80-5A47FE4F9DD1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_life_sciences:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B315997-8DD3-4244-B292-68568FB82CED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"360D781D-AD52-4309-A484-2150B10DFB02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_life_sciences:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BA294D6-4D4D-4ADB-A05B-F578A8877A4D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"764D9D95-26A8-441E-95E1-55C9CDEA59BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"012787EB-E7F0-4CAD-B406-6057A7F6F14F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_utilities:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"553D4A7C-E2F0-40F7-88FC-AB372DFCA9DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_for_utilities:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1480E9F7-9CA1-4F8D-977F-0F13594D0D36\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:control_desk:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E903B1-43FE-4120-95E1-2108B630D49B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:control_desk:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6282F8E2-9EFD-4CBE-8732-22659413B149\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013D299A-6A9C-44C7-B49C-A4115F4C13E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D5C1BCF-1DC0-45E7-B624-9221F8610346\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"235AE987-A109-4996-B43A-38C1BE23F37B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_service_request_manager:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95FF438A-31FC-44DD-AC14-C9332F0B0A3D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:change_and_configuration_management_database:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AF3DBFF-A377-4147-A6EB-BEC6F38FD8FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:change_and_configuration_management_database:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83470AC7-A06B-4443-9E60-B0AA18B69AC7\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460.\"}, {\"lang\": \"es\", \"value\": \"IBM Maximo Asset Management 7.1, 7.5 y 7.6; Maximo Asset Management Essentials 7.1 y 7.5; Control Desk 7.5 y 7.6; Tivoli Asset Management for IT 7.1 y 7.2; as\\u00ed como otros productos de IBM permiten que usuarios autenticados remotos omitan las restricciones de acceso previstas y lean entradas del registro de tareas de tickets arbitrarias mediante vectores sin especificar. IBM X-Force ID: 106460.\"}]",
"id": "CVE-2015-5016",
"lastModified": "2024-11-21T02:32:11.047",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-03-27T17:29:00.337",
"references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21971160\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/106460\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21971160\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/106460\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-5016\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2018-03-27T17:29:00.337\",\"lastModified\":\"2024-11-21T02:32:11.047\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460.\"},{\"lang\":\"es\",\"value\":\"IBM Maximo Asset Management 7.1, 7.5 y 7.6; Maximo Asset Management Essentials 7.1 y 7.5; Control Desk 7.5 y 7.6; Tivoli Asset Management for IT 7.1 y 7.2; as\u00ed como otros productos de IBM permiten que usuarios autenticados remotos omitan las restricciones de acceso previstas y lean entradas del registro de tareas de tickets arbitrarias mediante vectores sin especificar. IBM X-Force ID: 106460.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE721CF9-0F75-410B-A0F4-542041E25925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEBAE48-FFD0-4837-AB3B-F6C31B1AC8D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58B773C7-9386-4704-B85F-748578DBC242\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85457F6C-80FE-4E9F-BAB6-58B0485D8B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598EAB6C-7D41-46FE-BB32-D31014CA01D6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_energy_optimization:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FE69C7-D7C4-4707-B3EF-AC290F2CF92D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_aviation:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC96757-682F-4EBF-83A7-7C85C451ED26\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_government:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D8673B0-D385-467A-A60C-90A436C976D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_government:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4908AC9D-7410-47A6-BC46-5587C60061A2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4796CF9E-0065-4DE2-8C7A-22EB76F65E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75C69BA7-055F-446B-9E76-398D57680BA0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_transportation:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F780ADF-3151-4B2C-98B9-7FFD0DB47A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_transportation:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4367602D-5736-459D-82C1-099CD484F2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_transportation:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7759191C-5D16-4937-BC80-5A47FE4F9DD1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_life_sciences:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B315997-8DD3-4244-B292-68568FB82CED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360D781D-AD52-4309-A484-2150B10DFB02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_life_sciences:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA294D6-4D4D-4ADB-A05B-F578A8877A4D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"764D9D95-26A8-441E-95E1-55C9CDEA59BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012787EB-E7F0-4CAD-B406-6057A7F6F14F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_utilities:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D4A7C-E2F0-40F7-88FC-AB372DFCA9DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_for_utilities:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1480E9F7-9CA1-4F8D-977F-0F13594D0D36\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:control_desk:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E903B1-43FE-4120-95E1-2108B630D49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:control_desk:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6282F8E2-9EFD-4CBE-8732-22659413B149\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013D299A-6A9C-44C7-B49C-A4115F4C13E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D5C1BCF-1DC0-45E7-B624-9221F8610346\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"235AE987-A109-4996-B43A-38C1BE23F37B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_service_request_manager:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95FF438A-31FC-44DD-AC14-C9332F0B0A3D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:change_and_configuration_management_database:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF3DBFF-A377-4147-A6EB-BEC6F38FD8FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:change_and_configuration_management_database:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83470AC7-A06B-4443-9E60-B0AA18B69AC7\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21971160\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/106460\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21971160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/106460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…