CVE-2012-3327 (GCVE-0-2012-3327)

Vulnerability from cvelistv5 – Published: 2013-02-20 11:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:10.857Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
          },
          {
            "name": "mam-login-xss(78039)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78039"
          },
          {
            "name": "IV22698",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
        },
        {
          "name": "mam-login-xss(78039)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78039"
        },
        {
          "name": "IV22698",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-3327",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
            },
            {
              "name": "mam-login-xss(78039)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78039"
            },
            {
              "name": "IV22698",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-3327",
    "datePublished": "2013-02-20T11:00:00",
    "dateReserved": "2012-06-07T00:00:00",
    "dateUpdated": "2024-08-06T20:05:10.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F540E9A3-A1D7-4993-9149-295970944355\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA3625EE-DD32-43C1-8406-A23BD4DCD24E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6B68421-2A1E-4865-9F57-10C23F1D1ECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97CC1505-74F4-4F2F-A44A-54D6B9836548\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB3D1DE-5702-4533-AFB6-FBCD2601681E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E4240C-2BCD-4CDE-9134-E137759C22D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D7ED0B9-E115-42F3-A767-2DDE4D698723\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6F450DA-21C6-4B8E-B3F6-38B9BB0571EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C76E3C7-EF50-419D-A79A-E68FBD44F3A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D11C85F8-E4AA-4121-B8A6-5A2E56E5A05D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F261A268-7CD0-4328-8FBB-6AC40927DDFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"537C2C01-302E-48A2-9D50-C98AB6DBC466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65C72B48-0C0F-4C90-A34B-528A5C67432C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59090B6A-09AE-4597-A60A-38C20AEA8F3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74B7BC68-4BCB-4E02-9F6D-0F99DBE87FF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FB99EBA-9725-4AB3-B816-5E00ADD7B7EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A4B2CD-94F5-4449-8D1F-E69C3BA9929C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F077F88-37D3-43FA-8EA6-A7FBD9869AA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"741A13F4-DED0-43A2-8761-AAEAA0557B96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8945E452-7D50-4C59-B8CE-8F1C756DB01A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B590C42-21A1-4C62-8293-5A0D7AD628E4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management_essentials:6.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E041757-CFF1-4F3D-95FF-979BE37FCE0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCA89D39-C008-49CD-9D1E-7109644970AB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62B69712-B405-43F4-B6E9-BC1C232A36E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46711969-54C1-414A-B9F7-CCDCC4FFDA6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E834D7A-9614-45BC-8361-27D80F14068D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013D299A-6A9C-44C7-B49C-A4115F4C13E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D5C1BCF-1DC0-45E7-B624-9221F8610346\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54234F72-760A-4E80-8172-1AD93F0A372B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1EE7E44-638B-4B42-88F3-F8E4019D8287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_service_request_manager:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED3A0A74-83FB-4061-8232-4BAA9D901B75\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:maximo_service_desk:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D9DD16-F7C9-42E3-9E1D-36B4764C8503\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:change_and_configuration_management_database:7.1.:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CD271A-72E0-4730-A936-87B5122D9E3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:change_and_configuration_management_database:7.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2446CA6E-D316-4239-8FDC-436643EB35EA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83265FEF-C0CF-47B9-9A62-020897AABC5F\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de ejecuci\\u00f3n de secuencias de comandos en sitios cruzados (XSS) en IBM Maximo Asset Management v6.2 hasta v7.5, Maximo Asset Management Essentials v6.2 hasta v7.5, Tivoli Asset Management for IT v6.2 hasta v7.2, Tivoli Service Request Manager v7.1 y v7.2, Maximo Service Desk v6.2, Change and Configuration Management Database (CCMDB) v7.1 y v7.2, y SmartCloud Control Desk v7.5 que permite ataques remotos que inyectan comandos web o HTML a trav\\u00e9s de vectores relacionados con una acci\\u00f3n de registro.\"}]",
      "id": "CVE-2012-3327",
      "lastModified": "2024-11-21T01:40:39.043",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2013-02-20T12:09:21.990",
      "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21625624\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/78039\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21625624\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/78039\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@us.ibm.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-3327\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2013-02-20T12:09:21.990\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en IBM Maximo Asset Management v6.2 hasta v7.5, Maximo Asset Management Essentials v6.2 hasta v7.5, Tivoli Asset Management for IT v6.2 hasta v7.2, Tivoli Service Request Manager v7.1 y v7.2, Maximo Service Desk v6.2, Change and Configuration Management Database (CCMDB) v7.1 y v7.2, y SmartCloud Control Desk v7.5 que permite ataques remotos que inyectan comandos web o HTML a trav\u00e9s de vectores relacionados con una acci\u00f3n de registro.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F540E9A3-A1D7-4993-9149-295970944355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3625EE-DD32-43C1-8406-A23BD4DCD24E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B68421-2A1E-4865-9F57-10C23F1D1ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97CC1505-74F4-4F2F-A44A-54D6B9836548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB3D1DE-5702-4533-AFB6-FBCD2601681E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E4240C-2BCD-4CDE-9134-E137759C22D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7ED0B9-E115-42F3-A767-2DDE4D698723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F450DA-21C6-4B8E-B3F6-38B9BB0571EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C76E3C7-EF50-419D-A79A-E68FBD44F3A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11C85F8-E4AA-4121-B8A6-5A2E56E5A05D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F261A268-7CD0-4328-8FBB-6AC40927DDFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"537C2C01-302E-48A2-9D50-C98AB6DBC466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C72B48-0C0F-4C90-A34B-528A5C67432C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59090B6A-09AE-4597-A60A-38C20AEA8F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B7BC68-4BCB-4E02-9F6D-0F99DBE87FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB99EBA-9725-4AB3-B816-5E00ADD7B7EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A4B2CD-94F5-4449-8D1F-E69C3BA9929C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F077F88-37D3-43FA-8EA6-A7FBD9869AA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"741A13F4-DED0-43A2-8761-AAEAA0557B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8945E452-7D50-4C59-B8CE-8F1C756DB01A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B590C42-21A1-4C62-8293-5A0D7AD628E4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management_essentials:6.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E041757-CFF1-4F3D-95FF-979BE37FCE0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA89D39-C008-49CD-9D1E-7109644970AB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B69712-B405-43F4-B6E9-BC1C232A36E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46711969-54C1-414A-B9F7-CCDCC4FFDA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E834D7A-9614-45BC-8361-27D80F14068D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013D299A-6A9C-44C7-B49C-A4115F4C13E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D5C1BCF-1DC0-45E7-B624-9221F8610346\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54234F72-760A-4E80-8172-1AD93F0A372B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_service_request_manager:7.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1EE7E44-638B-4B42-88F3-F8E4019D8287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_service_request_manager:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3A0A74-83FB-4061-8232-4BAA9D901B75\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:maximo_service_desk:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9DD16-F7C9-42E3-9E1D-36B4764C8503\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:change_and_configuration_management_database:7.1.:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CD271A-72E0-4730-A936-87B5122D9E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:change_and_configuration_management_database:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2446CA6E-D316-4239-8FDC-436643EB35EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83265FEF-C0CF-47B9-9A62-020897AABC5F\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21625624\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/78039\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IV22698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21625624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/78039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…