{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:13:42.497","vulnerabilities":[{"cve":{"id":"CVE-2020-4319","sourceIdentifier":"psirt@us.ibm.com","published":"2020-07-28T12:15:12.270","lastModified":"2024-11-21T05:32:35.023","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM MQ, IBM MQ Appliance, and IBM MQ for HPE NonStop 8.0, 9.1 LTS, and 9.1 CD could allow under special circumstances, an authenticated user to obtain sensitive information due to a data leak from an error message within the pre-v7 pubsub logic. IBM X-Force ID: 177402."},{"lang":"es","value":"IBM MQ, IBM MQ Appliance e IBM MQ for HPE NonStop 8.0, 9.1 LTS y 9.1 CD, podrían permitir en circunstancias especiales, a un usuario autenticado obtener información confidencial debido a una filtración de datos de un mensaje de error dentro de la lógica pre-v7 pubsub. IBM X-Force ID: 177402"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndExcluding":"8.0.0.15","matchCriteriaId":"691172A5-00C2-42D2-A7C9-354EBF5B3408"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*","versionStartIncluding":"9.1.0.0","versionEndExcluding":"9.1.0.6","matchCriteriaId":"52062DF3-A5E8-4218-B5CC-85981ED21FF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*","versionStartIncluding":"9.1.0.0","versionEndExcluding":"9.2.0.0","matchCriteriaId":"46DAA494-9818-445A-93EE-A20BF8736F29"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/177402","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6252777","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/177402","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6252777","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}