Show plain JSON{"id": "CVE-2004-2558", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"url": "http://secunia.com/advisories/11761", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21168762", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10449", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16315", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/11761", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21168762", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10449", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16315", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in IBM Tivoli SecureWay Policy Director 3.8, Access Manager for e-business 3.9 to 5.1, Access Manager Identity Manager Solution 5.1, Configuration Manager 4.2, Configuration Manager for Automated Teller Machines 2.1.0, and IBM WebSphere Everyplace Server, Service Provider Offering for Multi-platforms 2.1.3 to 2.15 allow remote attackers to hijack sessions of authenticated users via unknown attack vectors involving certain cookies, aka \"Potential Credential Impersonation Attack.\""}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7681DCD-F704-4D87-B464-4BF43910CAEC"}, {"criteria": "cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D24097DF-065B-49C3-AC07-8358C0E462A2"}, {"criteria": "cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7319E4CB-5F62-4584-AD9A-3031F6B602B1"}, {"criteria": "cpe:2.3:a:ibm:tivoli_access_manager_identity_manager_solution:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF5FC716-66E9-41CF-BB0C-2E68C4FC14DF"}, {"criteria": "cpe:2.3:a:ibm:tivoli_configuration_manager:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "193DDA4D-BC65-4F30-8333-01DACDEF9213"}, {"criteria": "cpe:2.3:a:ibm:tivoli_configuration_manager_for_atm:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "332D58A2-602A-4448-A508-AB7DC2E524F7"}, {"criteria": "cpe:2.3:a:ibm:tivoli_secureway_policy_director:3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8A0D65D-4DF7-4A95-81A9-8B97AA44A2D8"}, {"criteria": "cpe:2.3:a:ibm:websphere_everyplace_server:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23A16347-2CC0-4104-8396-BDB83FBD83EE"}, {"criteria": "cpe:2.3:a:ibm:websphere_everyplace_server:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96130CA9-CD7D-401A-81D0-CAFC9D5BCF98"}, {"criteria": "cpe:2.3:a:ibm:websphere_everyplace_server:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "521C7EC4-D410-41F2-A455-F4165B569B49"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}