All the vulnerabilites related to IBM - Informix Dynamic Server
cve-2023-28527
Vulnerability from cvelistv5
Published
2023-12-09 02:15
Modified
2024-09-16 18:39
Severity ?
EPSS score ?
Summary
IBM Informix Dynamic Server buffer overflow
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7070188 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/251206 | vdb-entry |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251206" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-29T19:02:55.369389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T18:39:06.527Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "12.10, 14.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Informix Dynamic Server 12.10 and 14.10 cdr is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251206.\u003c/span\u003e\n\n" } ], "value": "\nIBM Informix Dynamic Server 12.10 and 14.10 cdr is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251206.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-09T02:15:39.553Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251206" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Informix Dynamic Server buffer overflow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2023-28527", "datePublished": "2023-12-09T02:15:39.553Z", "dateReserved": "2023-03-16T21:05:56.576Z", "dateUpdated": "2024-09-16T18:39:06.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20515
Vulnerability from cvelistv5
Published
2021-04-30 15:45
Modified
2024-09-16 18:18
Severity ?
EPSS score ?
Summary
IBM Informix Dynamic Server 14.10 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local privileged user could overflow a buffer and execute arbitrary code on the system or cause a denial of service condition. IBM X-Force ID: 198366.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6448568 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/198366 | vdb-entry, x_refsource_XF |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6448568" }, { "name": "ibm-informix-cve202120515-bo (198366)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "14.1" } ] } ], "datePublic": "2021-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Informix Dynamic Server 14.10 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local privileged user could overflow a buffer and execute arbitrary code on the system or cause a denial of service condition. IBM X-Force ID: 198366." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.8, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/C:H/S:U/PR:H/A:H/AV:L/UI:N/I:H/AC:L/RL:O/RC:C/E:U", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-30T15:45:15", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6448568" }, { "name": "ibm-informix-cve202120515-bo (198366)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2021-04-29T00:00:00", "ID": "CVE-2021-20515", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Informix Dynamic Server", "version": { "version_data": [ { "version_value": "14.1" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Informix Dynamic Server 14.10 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local privileged user could overflow a buffer and execute arbitrary code on the system or cause a denial of service condition. IBM X-Force ID: 198366." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "L", "AV": "L", "C": "H", "I": "H", "PR": "H", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6448568", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6448568 (Informix Dynamic Server)", "url": "https://www.ibm.com/support/pages/node/6448568" }, { "name": "ibm-informix-cve202120515-bo (198366)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198366" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2021-20515", "datePublished": "2021-04-30T15:45:15.878163Z", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-09-16T18:18:52.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1991
Vulnerability from cvelistv5
Published
2025-06-28 13:02
Modified
2025-06-30 18:33
Severity ?
EPSS score ?
Summary
IBM Informix Dynamic Server denial of service
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7238455 | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1991", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-30T18:26:37.929457Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-30T18:33:24.715Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:informix_dynamic_server:12.10:-:*:*:-:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:15.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "12.10,14.10,15.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "cnwangjihe" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Informix Dynamic Server 12.10,14.10, and15.0 could allow a remote attacker to cause a denial of service due to an integer underflow when processing packets." } ], "value": "IBM Informix Dynamic Server 12.10,14.10, and15.0 could allow a remote attacker to cause a denial of service due to an integer underflow when processing packets." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191 Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T13:02:21.000Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/7238455" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to IBM Informix Dynamic Server 14.10.xC11W2.\u003cbr\u003e\u003cbr\u003eFix is available on IBM Fix Central - Select Fixes - Informix Server.\u003cbr\u003eFollow the instructions for Database server upgrades in the Informix Servers documentation.\u003cbr\u003eUpdate to IBM Informix Dynamic Server 12.10.xC16W2.\u003cbr\u003e\u003cbr\u003eFix is available on IBM Fix Central - Select Fixes - Informix Server.\u003cbr\u003eFollow the instructions for Database server upgrades in the Informix Servers documentation.\u003cbr\u003e" } ], "value": "Update to IBM Informix Dynamic Server 14.10.xC11W2.\n\nFix is available on IBM Fix Central - Select Fixes - Informix Server.\nFollow the instructions for Database server upgrades in the Informix Servers documentation.\nUpdate to IBM Informix Dynamic Server 12.10.xC16W2.\n\nFix is available on IBM Fix Central - Select Fixes - Informix Server.\nFollow the instructions for Database server upgrades in the Informix Servers documentation." } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Informix Dynamic Server denial of service", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-1991", "datePublished": "2025-06-28T13:02:21.000Z", "dateReserved": "2025-03-05T16:10:23.797Z", "dateUpdated": "2025-06-30T18:33:24.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28526
Vulnerability from cvelistv5
Published
2023-12-09 02:22
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
IBM Informix Dynamic Server buffer overflow
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7070188 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/251204 | vdb-entry |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251204" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "12.10, 14.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Informix Dynamic Server 12.10 and 14.10 archecker is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251204.\u003c/span\u003e\n\n" } ], "value": "\nIBM Informix Dynamic Server 12.10 and 14.10 archecker is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251204.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-09T02:22:19.624Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251204" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Informix Dynamic Server buffer overflow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2023-28526", "datePublished": "2023-12-09T02:22:19.624Z", "dateReserved": "2023-03-16T21:05:56.575Z", "dateUpdated": "2024-08-02T13:43:22.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4799
Vulnerability from cvelistv5
Published
2020-10-08 13:20
Modified
2024-09-16 23:30
Severity ?
EPSS score ?
Summary
IBM Informix spatial 14.10 could allow a local user to execute commands as a privileged user due to an out of bounds write vulnerability. IBM X-Force ID: 189460.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6343587 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/189460 | vdb-entry, x_refsource_XF |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:14:58.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6343587" }, { "name": "ibm-informix-cve20204799-priv-escalation (189460)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "14.10" } ] } ], "datePublic": "2020-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Informix spatial 14.10 could allow a local user to execute commands as a privileged user due to an out of bounds write vulnerability. IBM X-Force ID: 189460." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/A:H/UI:N/C:H/I:H/PR:L/AV:L/S:U/RL:O/E:U/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T13:20:16", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6343587" }, { "name": "ibm-informix-cve20204799-priv-escalation (189460)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189460" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2020-10-07T00:00:00", "ID": "CVE-2020-4799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Informix Dynamic Server", "version": { "version_data": [ { "version_value": "14.10" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Informix spatial 14.10 could allow a local user to execute commands as a privileged user due to an out of bounds write vulnerability. IBM X-Force ID: 189460." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "L", "AV": "L", "C": "H", "I": "H", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6343587", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6343587", "url": "https://www.ibm.com/support/pages/node/6343587" }, { "name": "ibm-informix-cve20204799-priv-escalation (189460)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189460" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2020-4799", "datePublished": "2020-10-08T13:20:17.028481Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T23:30:22.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28523
Vulnerability from cvelistv5
Published
2023-12-09 02:24
Modified
2025-05-27 15:11
Severity ?
EPSS score ?
Summary
IBM Informix Dynamic Server buffer overflow
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7070188 | vendor-advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/250753 | vdb-entry |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Informix Dynamic Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250753" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T15:11:43.170434Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-27T15:11:52.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Informix Dynamic Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "12.10, 14.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Informix Dynamic Server 12.10 and 14.10 onsmsync is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 250753.\u003c/span\u003e\n\n" } ], "value": "\nIBM Informix Dynamic Server 12.10 and 14.10 onsmsync is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 250753.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-09T02:24:19.177Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/7070188" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250753" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Informix Dynamic Server buffer overflow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2023-28523", "datePublished": "2023-12-09T02:24:19.177Z", "dateReserved": "2023-03-16T21:05:56.575Z", "dateUpdated": "2025-05-27T15:11:52.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201601-0588
Vulnerability from variot
GSKit in IBM Security Network Protection 5.3.1 before 5.3.1.7 and 5.3.2 allows remote attackers to discover credentials by triggering an MD5 collision. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. The system can monitor application usage, website access and operation execution within the network to avoid threats such as malware and botnets. IBM GSKit (IBM Global Security Toolkit) is a set of security management tools for it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0588", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "security network protection", "scope": "eq", "trust": 2.7, "vendor": "ibm", "version": "5.3.2" }, { "model": "security network protection", "scope": "eq", "trust": 1.9, "vendor": "ibm", "version": "5.3.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "5.3.1.7" }, { "model": "security network protection", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "5.3.1" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1.3" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1.2" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1.1" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1.0" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.5" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.4" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.3" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.2" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.1" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.6" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.5" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.4" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.3" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.2" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.1" }, { "model": "websphere transformation extender secure adapter collection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.19" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.18" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.17" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.16" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.02" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.4" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.3" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.13" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.12" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.11" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.10" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.0" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "transformation extender", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.0" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9" }, { "model": "tivoli monitoring fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli monitoring fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.9" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.7" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.5" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.2" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.12" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.11" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.1" }, { "model": "tivoli continuous data protection for files", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7" }, { "model": "security siteprotector system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.1" }, { "model": "security siteprotector system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "security directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "security directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.14" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.13" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.12" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.11" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.10" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.9" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.8" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.7" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.6" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.5" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.4" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.3" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.2" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "personal communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.15" }, { "model": "mq appliance m2000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mobile connect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.5.2" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "infosphere biginsights", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "informix dynamic server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.10" }, { "model": "informix dynamic server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.7" }, { "model": "informix client sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.10" }, { "model": "informix client sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.70" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae purescale? feature for enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.8" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae express edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae connect? unlimited edition for system z\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae connect? unlimited edition for system i\u00ae", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae connect? enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae connect? application server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae advanced workgroup server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2\u00ae advanced enterprise server edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "datapower gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "datapower gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.8" }, { "model": "datapower gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.11" }, { "model": "datapower gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.14" }, { "model": "datapower gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.18" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "data server runtime client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "data server driver package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "data server driver for odbc and cli", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "data server client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "content manager ondemand for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "content manager ondemand for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "content manager ondemand for multiplatforms", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "content manager enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.3" }, { "model": "content manager enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "content collector for sap applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.0.2" }, { "model": "communications server for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "communications server for linux on system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "communications server for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "communications server for data center deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "communications server for aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.1" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.7" }, { "model": "datapower gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.4" }, { "model": "datapower gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.9" }, { "model": "datapower gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.12" }, { "model": "datapower gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.15" }, { "model": "datapower gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.19" } ], "sources": [ { "db": "BID", "id": "80883" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ibm:security_network_protection_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001298" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM", "sources": [ { "db": "BID", "id": "80883" } ], "trust": 0.3 }, "cve": "CVE-2016-0201", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2016-0201", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-87711", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2016-0201", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0201", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-0201", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201601-360", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-87711", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-87711" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GSKit in IBM Security Network Protection 5.3.1 before 5.3.1.7 and 5.3.2 allows remote attackers to discover credentials by triggering an MD5 collision. \nAttackers can exploit this issue to obtain sensitive information that may lead to further attacks. The system can monitor application usage, website access and operation execution within the network to avoid threats such as malware and botnets. IBM GSKit (IBM Global Security Toolkit) is a set of security management tools for it", "sources": [ { "db": "NVD", "id": "CVE-2016-0201" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "BID", "id": "80883" }, { "db": "VULHUB", "id": "VHN-87711" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0201", "trust": 2.8 }, { "db": "BID", "id": "80883", "trust": 1.4 }, { "db": "SECTRACK", "id": "1034696", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-001298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201601-360", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-87711", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-87711" }, { "db": "BID", "id": "80883" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "id": "VAR-201601-0588", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-87711" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:18:58.485000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "1974242", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974242" }, { "title": "IBM Security Network Protection GSKit Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59678" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-87711" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974242" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/80883" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034696" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0201" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0201" }, { "trust": 0.3, "url": "http://www.ibm.com/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21972246" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974389" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974452" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21974242" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974333" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974407" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974466" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974589" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974598" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974621" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974683" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974685" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974698" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974700" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?rs=630\u0026uid=swg21974785" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?rs=630\u0026uid=swg21974872" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974884" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974947" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974969" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974980" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975305" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975404" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976125" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21977787" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978392" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982312" } ], "sources": [ { "db": "VULHUB", "id": "VHN-87711" }, { "db": "BID", "id": "80883" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-87711" }, { "db": "BID", "id": "80883" }, { "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "db": "CNNVD", "id": "CNNVD-201601-360" }, { "db": "NVD", "id": "CVE-2016-0201" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-18T00:00:00", "db": "VULHUB", "id": "VHN-87711" }, { "date": "2016-01-15T00:00:00", "db": "BID", "id": "80883" }, { "date": "2016-01-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "date": "2016-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-360" }, { "date": "2016-01-18T05:59:07.647000", "db": "NVD", "id": "CVE-2016-0201" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-87711" }, { "date": "2017-01-12T00:14:00", "db": "BID", "id": "80883" }, { "date": "2016-01-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001298" }, { "date": "2016-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-360" }, { "date": "2016-12-07T18:30:24.503000", "db": "NVD", "id": "CVE-2016-0201" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-360" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Security Network Protection of GSKit Vulnerabilities in which authentication information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-360" } ], "trust": 0.6 } }