Page 6 of 37 results (0.012 seconds)

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

The ClearQuest Maintenance Tool in IBM Rational ClearQuest before 7 stores the database password in cleartext in an object in a ClearQuest connection profile or export file, which allows remote authenticated users to obtain sensitive information by locating the password object within the object tree during an import process. La herramienta ClearQuest Maintenance en IBM Rational ClearQuest anterior a la v7 almacena la contraseña de la base de datos en texto claro en un objeto en un perfil de conexión de ClearQuest o un fichero de exportación, que permitiría a usuarios remotos autenticados obtener información sensible localizando el objeto contraseña en el árbol de objetos durante un proceso de importación. • http://secunia.com/advisories/32847 http://www-01.ibm.com/support/docview.wss?uid=swg1PK65908 https://exchange.xforce.ibmcloud.com/vulnerabilities/46995 • CWE-310: Cryptographic Issues •

CVSS: 4.4EPSS: 0%CPEs: 8EXPL: 0

The ClearQuest Maintenance Tool in IBM Rational ClearQuest 7.0.0 before 7.0.0.4 and 7.0.1 before 7.0.1.3 on Windows allows local users to obtain (1) user and (2) database passwords by using a password revealer utility on a field containing a series of asterisks. La herramienta ClearQuest Maintenance en IBM Rational ClearQuest v7.0.0 anterior a la v7.0.0.4 v7.0.1 anterior a la v7.0.1.3 en Windows permitiría a usuarios locales obtener (1) usuario y (2) contraseñas de la base de datos mediante una utilidad de revelación de contraseña en un campo que contiene una serie de asteriscos. • http://secunia.com/advisories/32847 http://www-01.ibm.com/support/docview.wss?uid=swg1PK30938 http://www.securityfocus.com/bid/32577 https://exchange.xforce.ibmcloud.com/vulnerabilities/46994 • CWE-255: Credentials Management Errors •

CVSS: 6.5EPSS: 0%CPEs: 9EXPL: 0

The ClearQuest Maintenance Tool in IBM Rational ClearQuest 7 before 7.1 stores the database password in cleartext in an object in a ClearQuest connection profile or export file, which allows remote authenticated users to obtain sensitive information by locating the password object within the object tree. La herramienta ClearQuest Maintenance en IBM Rational ClearQuest v7 anterior a la v7.1 almacena la contraseña de la base de datos en texto claro en un objeto en un perfil de conexión de ClearQuest o un fichero de exportación, que permitiría a usuarios remotos autenticados obtener información sensible localizando el objeto contraseña en el árbol de objetos. • http://secunia.com/advisories/32847 http://www-01.ibm.com/support/docview.wss?uid=swg1PK65908 https://exchange.xforce.ibmcloud.com/vulnerabilities/46995 • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in CQ Web in IBM Rational ClearQuest 7.0.0 before 7.0.0.4 and 7.0.1 before 7.0.1.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de secuencias de ejecución de comandos en sitios cruzados en CQ Web en IBM Rational ClearQuest v7.0.0 anterior a la v7.0.0.4 y 7.0.1 anterior a la v7.0.1.3 permitiría a atacantes remotos inyectar secuencias de comandos web o HTML a su elección a través de vectores no específicos. • http://secunia.com/advisories/32847 http://www-01.ibm.com/support/docview.wss?uid=swg1PK69316 http://www.osvdb.org/50369 http://www.securityfocus.com/bid/32576 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The CQWeb login page in IBM Rational ClearQuest 7.0.1 allows remote attackers to obtain potentially sensitive information (page source code) via a combination of ?script? and ?/script? sequences in the id field, possibly related to a cross-site scripting (XSS) vulnerability. • http://www-1.ibm.com/support/docview.wss?uid=swg1PK68332 http://www.securitytracker.com/id?1020642 http://www.vupen.com/english/advisories/2008/2317 https://exchange.xforce.ibmcloud.com/vulnerabilities/44254 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •