Show plain JSON{"id": "CVE-2014-6150", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-10-31T10:55:02.377", "references": [{"url": "http://secunia.com/advisories/61785", "source": "psirt@us.ibm.com"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688424", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96920", "source": "psirt@us.ibm.com"}, {"url": "http://secunia.com/advisories/61785", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688424", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96920", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.2.1.0 through 7.2.1.6 and 7.2.2.0 through 7.2.2.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."}, {"lang": "es", "value": "Vulnerabilidad de XSS en IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.2.1.0 hasta 7.2.1.6 y 7.2.2.0 hasta 7.2.2.2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F27ECD8-CC5D-4974-AE3B-658D2871FF0F"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "035E6C30-71E7-4EA9-A3C1-71BB371E4A94"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCD5C82A-7E0E-4282-B9B1-0655670BD53E"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45DA120-0BFB-4F0C-990B-34C0821B5583"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5695CA2C-7F34-4350-8C25-F5584ABCCCF1"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42BFE717-10BC-4710-AFE9-1565F32C2450"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "757D89F2-7C6D-4213-89EF-DE766D161B26"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2F6EF3-721A-43AB-AAFD-BE3EEDB0AA61"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DD8CEAD-68EF-4E15-AC6A-ED04839E1F72"}, {"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D79C7CB3-DB2B-4E13-B4D8-25F90B0A057E"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}