Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "11ABF7CC-2FA5-4F2D-901A-2D0EF5B8E717", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*", "matchCriteriaId": "58147402-53D5-4F15-862B-EE3DCCD75E2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*", "matchCriteriaId": "D3F3CB5E-D4FB-4C03-B108-06CC358B1F45", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*", "matchCriteriaId": "CB2EA14A-878A-4D8D-B17A-568712D21C48", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*", "matchCriteriaId": "84C925CD-E753-401F-9EC0-6E3D9861C818", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*", "matchCriteriaId": "651D042C-A9F1-42D1-A6DD-95ADBCD08448", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*", "matchCriteriaId": "0A589323-B8B8-4CB4-B1A9-B9E771C99123", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*", "matchCriteriaId": "61252AF9-A231-442A-A473-BA0608323BF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*", "matchCriteriaId": "EB37A1AA-58F0-4A39-8E38-C70692CE67BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:db2:9.5:fp5:*:*:*:*:*:*", "matchCriteriaId": "1D9D5B5B-8E23-4987-9BBE-8FE1F27CB1B5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The Install component in IBM DB2 UDB 9.5 before FP6a on Linux, UNIX, and Windows enforces an unintended limit on password length, which makes it easier for attackers to obtain access via a brute-force attack."}, {"lang": "es", "value": "El componente Install en IBM DB2 UDB v9.5 anterior a FP6a sobre Linux, UNIX y Windows, tiene una limitaci\u00f3n en el n\u00famero de caracteres en la longitud de una contrase\u00f1a, lo que facilita a atacantes acceder a trav\u00e9s de un ataque de fuerza bruta."}], "id": "CVE-2010-3734", "lastModified": "2024-11-21T01:19:28.650", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-10-05T18:00:33.253", "references": [{"source": "cve@mitre.org", "url": "ftp://public.dhe.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC62856"}, {"source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14764"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://public.dhe.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC62856"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14764"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}