{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T17:22:19.902","vulnerabilities":[{"cve":{"id":"CVE-2014-3041","sourceIdentifier":"psirt@us.ibm.com","published":"2014-08-26T14:55:05.767","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in IBM Emptoris Contract Management 9.5.x before 9.5.0.6 iFix 10, 10.0.0.x before 10.0.0.1 iFix 10, 10.0.1.x before 10.0.1.4, and 10.0.2.x before 10.0.2.2 iFix 2 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en IBM Emptoris Contract Management 9.5.x anterior a 9.5.0.6 iFix 10, 10.0.0.x anterior a 10.0.0.1 iFix 10, 10.0.1.x anterior a 10.0.1.4, y 10.0.2.x anterior a 10.0.2.2 iFix 2 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F6F3C251-C3BA-4304-9878-102F3F2FFFCB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"82DA8E24-DDBC-48E0-A2A3-57E06CDCF85C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"70478E47-1C52-45E6-92A9-698CA5C25C3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"4B85D7E5-9D5B-4B77-A032-3BF92C2EF735"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"A85A9BD0-6E1F-4758-AEF3-E10CC4F9FDCF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"479D5852-9127-4AB3-82BB-37A552C14781"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"991D88E6-740E-4F75-B616-5179B015A9D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"88BD708C-D51D-4990-8262-52DB13B7EDC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"629E78F5-0CEE-4CC2-8C4B-949D15531905"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"808FE7AE-3D37-4646-AE54-6D430122DBCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.1:*:*:*:*:*:*:*","matchCriteriaId":"892A2283-35E9-4E61-A6D0-B3AF6FE16869"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FCDC9134-E550-495D-92E7-81CF72A2CC65"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.3:*:*:*:*:*:*:*","matchCriteriaId":"9B5470C2-DEB2-4DB9-9637-908FD1A0AE70"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.0:*:*:*:*:*:*:*","matchCriteriaId":"6827F5B1-0114-472F-9991-14F8B49D8B94"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.1:*:*:*:*:*:*:*","matchCriteriaId":"C7BAC0A1-FAE0-49F1-AE13-7022122A8E76"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.2:*:*:*:*:*:*:*","matchCriteriaId":"7CB8BBCB-22B3-4C96-9DF9-66163EFBA40D"}]}]}],"references":[{"url":"http://secunia.com/advisories/60479","source":"psirt@us.ibm.com"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21680370","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93318","source":"psirt@us.ibm.com"},{"url":"http://secunia.com/advisories/60479","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21680370","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93318","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}