CVE-2014-0839
Published Feb 26, 2014
Last updated 7 years ago
Overview
- Description
- IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 allows remote authenticated users to modify data via vectors involving a direct object reference.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46577E1B-77E6-4FE6-8B1F-F2A61FB0C15F" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30870B43-5757-43FC-BB10-DC0FD6996DFE" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44678DC6-2D43-412D-89E0-F92B89BE1FD5" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253B6795-4B4B-4CD0-97EB-ACD1587C497A" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A94966-DD5E-490F-BDEE-2AEA9EECBFA5" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B52DB62D-5D12-4AE4-8A14-EA2782A92CA2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55D71481-7552-4BE7-9BD0-C45BC5AAC3D2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12B184B3-679B-4F27-9168-142090F99333" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C89D96-8E49-4B4D-8D63-C240F5E9B439" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF5FBBF-750D-49FF-97E8-91E9D29D53DA" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08F0C674-068D-43F9-BADE-0707008FF47F" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD4F5963-909C-404E-AF58-885DBBC78FB2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7B0657-4C0D-4CE7-8AB9-996EFF1DE4E2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C3CD52F-48BB-49AD-BF77-DC5762051950" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A872F738-296B-443F-B6E1-5B8200A05270" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDD57F9E-5569-4F38-8C1B-BF033498639E" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "794382A6-042F-4036-B7DA-702135B1BE51" } ], "operator": "OR" } ] } ]