{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:52:21.575","vulnerabilities":[{"cve":{"id":"CVE-2016-2974","sourceIdentifier":"psirt@us.ibm.com","published":"2017-08-29T21:29:00.340","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Sametime Connect 8.5.2 and 9.0, after uninstalling the Sametime Rich Client, could disclose potentially sensitive information related to the Sametime environment as well as other users on the local machine of the user. IBM X-Force ID: 113934."},{"lang":"es","value":"IBM Sametime Connect 8.5.2 y 9.0, después de desinstalar Sametime Rich Client, podría divulgar información potencialmente sensible sobre el entorno de Sametime, así como de otros usuarios que se encuentren en la misma máquina local del usuario. IBM X-Force ID: 113934."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*","matchCriteriaId":"4D106630-D04F-406F-A3BD-029777B8E8F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"A84C4658-AEE7-4C63-A188-795B8FEB3A47"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"624F11B5-9305-49E9-A7F1-45845234BFD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1E5B5DF0-0678-4E47-AC68-E24B5A93597D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F6F45A7B-1865-400A-A2E0-6E7BE46F6C8C"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22006444","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100528","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/113934","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22006444","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100528","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/113934","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}}]}