Show plain JSON{"id": "CVE-2010-3757", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2010-10-05T22:00:06.707", "references": [{"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg21443820", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/514069/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://zerodayinitiative.com/advisories/ZDI-10-185/", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "Format string vulnerability in the _Eventlog function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via format string specifiers located after a | (pipe) character in a string. NOTE: this might overlap CVE-2010-3059."}, {"lang": "es", "value": "Vulnerabilidad de formato de cadena en la funci\u00f3n _Eventlog en FastBackServer.exe en el servidor de IBM Tivoli Storage Manager (TSM) Fastback v5.5.0.0 a v5.5.6.0 y v6.1.0.0 a v6.1.0.1 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de formato de cadena ubicados despu\u00e9s de un | (pipe) en una cadena. NOTA: esto puede superponerse a CVE-2010-3059."}], "lastModified": "2018-10-10T20:05:17.510", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A482E38-2B78-4064-8682-F7A571D1734C"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "840361B9-B3F8-448B-BC7E-065BA4871E46"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8734E08A-716E-4E29-A440-5FB437F7EF46"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FF1E98E-B3F5-4348-8D45-B9A8CC916F47"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA49D704-CCC4-48C0-91F9-E6A3A4181FE0"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D3202AE-CCAB-4120-8F60-B8809C8B192F"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43030674-F9E7-483E-8F47-4B5075A480D7"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6611E2-9E6A-407A-8649-874E12F12791"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C7756DB-DD6D-4A63-9214-131431F809A0"}, {"criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75B7DD63-0696-4D98-BE7F-05D7E953752E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}