{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T21:14:38.791","vulnerabilities":[{"cve":{"id":"CVE-2016-9738","sourceIdentifier":"psirt@us.ibm.com","published":"2017-06-27T16:29:00.260","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM QRadar 7.2 and 7.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 119783."},{"lang":"es","value":"IBM QRadar 7.2 y 7.3 no requiere que los usuarios tengan contraseñas fuertes por defecto, lo que facilita que los atacantes comprometan las cuentas de usuario. IBM X-Force ID: 119783."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-254"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*","matchCriteriaId":"7C137959-2279-4459-8A10-43AFE09E2641"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:*:*:*:*:*:*:*","matchCriteriaId":"39D53329-E729-43C1-8C67-EFA4C3F7BFBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:*:*:*:*:*:*:*","matchCriteriaId":"9FC4EDCA-DF37-4366-B944-F342FA55EEFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:*:*:*:*:*:*:*","matchCriteriaId":"09D0DA15-7DC3-4B1E-9CD9-EFC7FE4C0FEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:*:*:*:*:*:*:*","matchCriteriaId":"76CA942D-70AD-4E0D-A28E-443FB7140A54"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:*:*:*:*:*:*:*","matchCriteriaId":"E6BE1C0B-DCDE-40E9-80AE-F9117FA23F68"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:*:*:*:*:*:*:*","matchCriteriaId":"CE8844C7-52E1-45A0-AC51-B6F6F14DE38A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:*:*:*:*:*:*:*","matchCriteriaId":"5382FD46-85CB-460F-8AA5-163EA26F34B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:*:*:*:*:*:*:*","matchCriteriaId":"1C35F4DF-BFA0-4855-BBDB-CF6047AAC9D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*","matchCriteriaId":"73151221-C102-4425-9316-1EE4CAAB6531"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*","matchCriteriaId":"2356A4E6-561B-40CA-8348-B30D581B1E46"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*","matchCriteriaId":"74509F3F-840E-48B8-88B1-EA4FFB90ACC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*","matchCriteriaId":"BE7BD528-628F-4CA9-9FE8-8A79BDC97680"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*","matchCriteriaId":"26118C2B-78CC-4038-9DEA-7A9417029790"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*","matchCriteriaId":"29EBC1DD-6949-4B12-8CA5-EE2BCDB8C4C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:*","matchCriteriaId":"0063D4AA-6C00-4ABB-A315-27B06B5D3928"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p1:*:*:*:*:*:*","matchCriteriaId":"36CA1C3A-63CA-4FBD-9E84-7E83248265EB"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22004926","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99266","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/119783","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22004926","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99266","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/119783","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}