CVE-2014-0842
Published Feb 26, 2014
Last updated 7 years ago
Overview
- Description
- The account-creation functionality in IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 places the new user's default password within the creation page, which allows remote attackers to obtain sensitive information by reading the HTML source code.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46577E1B-77E6-4FE6-8B1F-F2A61FB0C15F" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30870B43-5757-43FC-BB10-DC0FD6996DFE" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44678DC6-2D43-412D-89E0-F92B89BE1FD5" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253B6795-4B4B-4CD0-97EB-ACD1587C497A" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A94966-DD5E-490F-BDEE-2AEA9EECBFA5" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B52DB62D-5D12-4AE4-8A14-EA2782A92CA2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55D71481-7552-4BE7-9BD0-C45BC5AAC3D2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12B184B3-679B-4F27-9168-142090F99333" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C89D96-8E49-4B4D-8D63-C240F5E9B439" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF5FBBF-750D-49FF-97E8-91E9D29D53DA" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08F0C674-068D-43F9-BADE-0707008FF47F" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD4F5963-909C-404E-AF58-885DBBC78FB2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7B0657-4C0D-4CE7-8AB9-996EFF1DE4E2" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C3CD52F-48BB-49AD-BF77-DC5762051950" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A872F738-296B-443F-B6E1-5B8200A05270" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDD57F9E-5569-4F38-8C1B-BF033498639E" }, { "criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "794382A6-042F-4036-B7DA-702135B1BE51" } ], "operator": "OR" } ] } ]