{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T12:27:14.612","vulnerabilities":[{"cve":{"id":"CVE-2021-29700","sourceIdentifier":"psirt@us.ibm.com","published":"2021-10-07T18:15:08.437","lastModified":"2024-11-21T06:01:39.783","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656."},{"lang":"es","value":"IBM Sterling B2B Integrator Standard Edition versiones 5.2.0.0 hasta 6.1.1.0, podría permitir a un atacante autenticado obtener información confidencial de los archivos de configuración que podría ayudar a otros ataques contra el sistema. IBM X-Force ID: 200656"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2.0.0","versionEndIncluding":"5.2.6.5_4","matchCriteriaId":"FB375337-AF4F-4E40-B08E-EF0B10A93D0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0.0","versionEndIncluding":"6.0.0.6","matchCriteriaId":"82AAB06B-6971-4463-ABA0-EBC180425C45"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.1.0","versionEndIncluding":"6.0.3.4","matchCriteriaId":"3A4DC6EA-5E6B-4180-B266-CB220A8C5C10"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0.0","versionEndIncluding":"6.1.0.2","matchCriteriaId":"2E8977CE-FA69-44DC-AEC1-29748483C737"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/200656","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6496749","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/200656","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6496749","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}