Show plain JSON{"id": "CVE-2016-5997", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2016-09-26T04:59:37.877", "references": [{"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21990216", "tags": ["Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.securityfocus.com/bid/93144", "source": "psirt@us.ibm.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-640"}]}], "descriptions": [{"lang": "en", "value": "The web portal in IBM Tealeaf Customer Experience before 8.7.1.8847 FP10, 8.8 before 8.8.0.9049 FP9, 9.0.0 and 9.0.1 before 9.0.1.1117 FP5, 9.0.1A before 9.0.1.5108_9.0.1A FP5, 9.0.2 before 9.0.2.1223 FP3, and 9.0.2A before 9.0.2.5224_9.0.2A FP3 does not apply password-quality rules to password changes, which makes it easier for remote attackers to obtain access via a brute-force attack."}, {"lang": "es", "value": "El portal web en IBM Tealeaf Customer Experience en versiones anteriores a 8.7.1.8847 FP10, 8.8 en versiones anteriores a 8.8.0.9049 FP9, 9.0.0 y 9.0.1 en versiones anteriores a 9.0.1.1117 FP5, 9.0.1A en versiones anteriores a 9.0.1.5108_9.0.1A FP5, 9.0.2 en versiones anteriores a 9.0.2.1223 FP3 y 9.0.2A en versiones anteriores a 9.0.2.5224_9.0.2A FP3 no aplica reglas de calidad de contrase\u00f1as para los cambios de contrase\u00f1as, lo que facilita a atacantes remotos obtener acceso a trav\u00e9s de un ataque de fuerza bruta."}], "lastModified": "2016-11-28T20:30:27.290", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F356136-5E64-43D5-94D2-A08934DEBD1C", "versionEndIncluding": "8.7"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBAC9796-BA52-48AF-9326-3C2343BE2342"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D705DD1-8F24-49B4-8D05-F0403A625016"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D66B990-2034-46D9-AF8D-DE69B3161F38"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50EC1311-629F-401B-9AE3-8ECDE0CBF330"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AFA47D5-AC5B-4A1B-83A6-EE5D49ECE489"}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5FE2E49-88CF-4D61-8097-B3146A47BAED"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}