{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T17:24:22.956631900Z","vulnerabilities":[{"cve":{"id":"CVE-2016-5958","sourceIdentifier":"psirt@us.ibm.com","published":"2017-02-01T20:59:01.347","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Security Privileged Identity Manager could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information."},{"lang":"es","value":"IBM Security Privileged Identity Manager podrían permitir a un atacante remoto obtener información sensible, provocada por la falta para establecer el indicador seguro para la cookie de sesión en modo SSL. Al interceptar su transmisión dentro de una sesión HTTP, un atacante podría explotar esta vulnerabilidad para capturar la cookie y obtener información sensible."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"D07547A7-E87E-4085-983F-29BD485E3160"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:security_privileged_identity_manager:2.1:*:*:*:*:*:*:*","matchCriteriaId":"8C26B4C2-D6EC-4367-9D59-BE9FF8DC2395"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg21996614","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/95196","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg21996614","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/95196","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}