cve-2016-2894
Vulnerability from cvelistv5
Published
2016-07-03 21:00
Modified
2024-08-05 23:40
Severity ?
EPSS score ?
Summary
IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:13.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985579" }, { "name": "IT13686", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686" }, { "name": "91534", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91534" }, { "name": "1036220", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036220" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-30T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985579" }, { "name": "IT13686", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686" }, { "name": "91534", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91534" }, { "name": "1036220", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036220" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2016-2894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21985579", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985579" }, { "name": "IT13686", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686" }, { "name": "91534", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91534" }, { "name": "1036220", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036220" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2016-2894", "datePublished": "2016-07-03T21:00:00", "dateReserved": "2016-03-09T00:00:00", "dateUpdated": "2024-08-05T23:40:13.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D9816F-5D2A-4B2B-A654-16B4AE04B88D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0ADAA69-B258-4666-9AB7-7965429EA497\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9FF105A-6B8E-4849-875F-FD87EC9291E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F41474E8-A930-43D1-8F4D-E6C219B6DB0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"175D813D-9D9E-4FC6-984F-0E31ED4101C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0C2CB3F-61A9-4970-B043-11A105B2D439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66CC6409-5ADA-450E-B486-8E1D8F97DBB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D789F756-2B42-4C39-94ED-AEC0A82FE119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E11F79C4-D61F-481B-9BDC-ADEDE1494AAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76EC7D2D-4B0A-4CDF-A523-85ABEF05D211\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C7DD9CE-0E95-45BB-9BB5-07652C9FD6C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F3F3288-4280-43DA-B6E4-8240137105AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90CAA216-D0B3-4ECB-8BBE-5288DE590DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10524DD7-E9F2-498C-93F1-54F2C47AAEBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863D87DB-64FD-4C97-9CAD-48ED2A298FA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"295AD957-904D-4917-BCDD-27E5E4AD9E27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF7DA554-D2AE-45FF-AEB9-551F9AD9C9B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C05C02E3-24CC-496C-912E-951A1541F7AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7660C8A-2C6A-4AA1-95DB-DA6F4BA7A821\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45172E20-5E12-435E-815F-D543C9B6BD41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9625017C-311D-423A-BFF8-AEB4CE7766FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3538EBB1-A960-4CE7-B07D-17CAFF9F3564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A53C1A-0B43-4EB8-B489-742AAD1D4379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92592FF3-70F2-4C48-A2A0-C5C8E8DCC649\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99AF4A3C-759F-41C4-B471-C2D63409919A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF7A543F-FD79-42C8-9DAF-2DD549926DDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CC99211-3DF3-414F-BC31-59286E7C84A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A018347-E8E9-4CCC-B118-247D9064D768\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D406098E-B724-4E5F-8B47-60B4FAE1B6AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3707B2DD-1855-4094-B0B5-C1204EBB221C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"122C35D5-BF80-4DE4-861D-C7D6D4D56777\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"581F420E-BBA2-4302-B8A1-ED8BFE78155E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26CE2C13-53F7-4A4D-9DDC-0E00B0263858\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA4D3E9E-144A-4F7C-973A-F7FBE0776FB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2E9FBE6-B342-43BD-BB32-650A87AB8EBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EE5B74B-4D98-42E2-A011-02E6D473F3A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5FC5E0D-997F-4256-8575-E7507D418BE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F6E5BDA-9DBD-4143-882C-F4BA3ADA1595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66CACC2-73DA-4814-ABA2-19DB74A2ECBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30E46E24-AABB-455C-BCBE-752E2C0E5BF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6506496-40CE-4558-ACCC-363AB9675C4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FFF3F1D-E6F5-4CA1-9BFD-C4C4B645FB0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD1F7B4-13EF-4CE4-807E-95249EAA3C62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF714DF6-15DF-4BFD-A4F9-E9E9E333CFE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"906D67F5-DEC8-464D-BC4D-BAF223E72C23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1A60ADB-D0D9-413D-96A7-4BFDF494CC75\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"212B26BB-0A19-41EB-811C-04C765374E8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C934CA2-8606-479E-AA9F-AB70E7BB30FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53CF0089-B81D-4738-85AC-E728DF77FBAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF39AAEE-2FC3-4ACC-AEF7-6E12EEEF0BCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C71F01C8-C1BB-4E93-8AE8-A1B5131310B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59C16BD-1CB8-47BB-8352-B1609798BB0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB3B365E-0505-4A43-90A6-811D39BB6262\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A07C8F-4DD0-4767-8A8F-A1721EBDE583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D972077-A132-430D-97E6-8F0F8B0F79B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DC78448-7AD8-438B-8AFC-79B31FB706D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E832B30-592B-43F4-B50D-34CABAC61E3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3B578C6-A29A-41B6-A9B6-F7A08D9BE34B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FC3FEDA-B353-4C31-A349-1A12F4FAF465\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8CA94D1-06FB-4C94-83FB-2BC52676BBDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"302756E5-F3E8-4F5E-90EA-A81A88DB55AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D92EDDEE-1135-4EE7-972E-19471352E0A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C980FE7-8B2D-4ED4-A5BF-78615AD0F596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD269C39-1070-44C3-B7FC-968C12A344E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AC65208-F124-4D28-B5D8-3A3C774C82A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E782420B-2A62-4537-88EB-1169C73AC21B\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions.\"}, {\"lang\": \"es\", \"value\": \"IBM Spectrum Protect (anteriormente Tivoli Storage Manager) 5.5 hasta la versi\\u00f3n 6.3 en versiones anteriores a 6.3.2.6, 6.4 en versiones anteriores a 6.4.3.3 y 7.1 en versiones anteriores a 7.1.6 permite a usuarios locales obtener datos sensibles recuperados de cuentas arbitrarias en circunstancias oportunistas aprovechando un uso anterior de un symlink durante acciones de archivo y recuperaci\\u00f3n.\"}]", "id": "CVE-2016-2894", "lastModified": "2024-11-21T02:49:00.770", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 2.5, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2016-07-03T21:59:14.150", "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21985579\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/91534\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www.securitytracker.com/id/1036220\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21985579\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/91534\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1036220\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2016-2894\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2016-07-03T21:59:14.150\",\"lastModified\":\"2024-11-21T02:49:00.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Spectrum Protect (formerly Tivoli Storage Manager) 5.5 through 6.3 before 6.3.2.6, 6.4 before 6.4.3.3, and 7.1 before 7.1.6 allows local users to obtain sensitive retrieved data from arbitrary accounts in opportunistic circumstances by leveraging previous use of a symlink during archive and retrieve actions.\"},{\"lang\":\"es\",\"value\":\"IBM Spectrum Protect (anteriormente Tivoli Storage Manager) 5.5 hasta la versi\u00f3n 6.3 en versiones anteriores a 6.3.2.6, 6.4 en versiones anteriores a 6.4.3.3 y 7.1 en versiones anteriores a 7.1.6 permite a usuarios locales obtener datos sensibles recuperados de cuentas arbitrarias en circunstancias oportunistas aprovechando un uso anterior de un symlink durante acciones de archivo y recuperaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":2.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D9816F-5D2A-4B2B-A654-16B4AE04B88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0ADAA69-B258-4666-9AB7-7965429EA497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9FF105A-6B8E-4849-875F-FD87EC9291E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41474E8-A930-43D1-8F4D-E6C219B6DB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"175D813D-9D9E-4FC6-984F-0E31ED4101C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C2CB3F-61A9-4970-B043-11A105B2D439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66CC6409-5ADA-450E-B486-8E1D8F97DBB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:5.5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D789F756-2B42-4C39-94ED-AEC0A82FE119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11F79C4-D61F-481B-9BDC-ADEDE1494AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EC7D2D-4B0A-4CDF-A523-85ABEF05D211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C7DD9CE-0E95-45BB-9BB5-07652C9FD6C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3F3288-4280-43DA-B6E4-8240137105AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90CAA216-D0B3-4ECB-8BBE-5288DE590DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10524DD7-E9F2-498C-93F1-54F2C47AAEBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863D87DB-64FD-4C97-9CAD-48ED2A298FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295AD957-904D-4917-BCDD-27E5E4AD9E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7DA554-D2AE-45FF-AEB9-551F9AD9C9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05C02E3-24CC-496C-912E-951A1541F7AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7660C8A-2C6A-4AA1-95DB-DA6F4BA7A821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45172E20-5E12-435E-815F-D543C9B6BD41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9625017C-311D-423A-BFF8-AEB4CE7766FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3538EBB1-A960-4CE7-B07D-17CAFF9F3564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A53C1A-0B43-4EB8-B489-742AAD1D4379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92592FF3-70F2-4C48-A2A0-C5C8E8DCC649\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AF4A3C-759F-41C4-B471-C2D63409919A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7A543F-FD79-42C8-9DAF-2DD549926DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC99211-3DF3-414F-BC31-59286E7C84A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A018347-E8E9-4CCC-B118-247D9064D768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D406098E-B724-4E5F-8B47-60B4FAE1B6AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3707B2DD-1855-4094-B0B5-C1204EBB221C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122C35D5-BF80-4DE4-861D-C7D6D4D56777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581F420E-BBA2-4302-B8A1-ED8BFE78155E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CE2C13-53F7-4A4D-9DDC-0E00B0263858\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4D3E9E-144A-4F7C-973A-F7FBE0776FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E9FBE6-B342-43BD-BB32-650A87AB8EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE5B74B-4D98-42E2-A011-02E6D473F3A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5FC5E0D-997F-4256-8575-E7507D418BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6E5BDA-9DBD-4143-882C-F4BA3ADA1595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66CACC2-73DA-4814-ABA2-19DB74A2ECBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E46E24-AABB-455C-BCBE-752E2C0E5BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6506496-40CE-4558-ACCC-363AB9675C4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFF3F1D-E6F5-4CA1-9BFD-C4C4B645FB0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD1F7B4-13EF-4CE4-807E-95249EAA3C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF714DF6-15DF-4BFD-A4F9-E9E9E333CFE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906D67F5-DEC8-464D-BC4D-BAF223E72C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A60ADB-D0D9-413D-96A7-4BFDF494CC75\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212B26BB-0A19-41EB-811C-04C765374E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C934CA2-8606-479E-AA9F-AB70E7BB30FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53CF0089-B81D-4738-85AC-E728DF77FBAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF39AAEE-2FC3-4ACC-AEF7-6E12EEEF0BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71F01C8-C1BB-4E93-8AE8-A1B5131310B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59C16BD-1CB8-47BB-8352-B1609798BB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB3B365E-0505-4A43-90A6-811D39BB6262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A07C8F-4DD0-4767-8A8F-A1721EBDE583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D972077-A132-430D-97E6-8F0F8B0F79B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC78448-7AD8-438B-8AFC-79B31FB706D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E832B30-592B-43F4-B50D-34CABAC61E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3B578C6-A29A-41B6-A9B6-F7A08D9BE34B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC3FEDA-B353-4C31-A349-1A12F4FAF465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8CA94D1-06FB-4C94-83FB-2BC52676BBDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"302756E5-F3E8-4F5E-90EA-A81A88DB55AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D92EDDEE-1135-4EE7-972E-19471352E0A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C980FE7-8B2D-4ED4-A5BF-78615AD0F596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD269C39-1070-44C3-B7FC-968C12A344E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC65208-F124-4D28-B5D8-3A3C774C82A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E782420B-2A62-4537-88EB-1169C73AC21B\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21985579\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91534\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www.securitytracker.com/id/1036220\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IT13686\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21985579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036220\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.