Show plain JSON{"id": "CVE-2015-1996", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-11-08T22:59:05.607", "references": [{"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970139", "tags": ["Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970139", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 does not prevent caching of HTTPS responses, which allows physically proximate attackers to obtain sensitive local-cache information by leveraging an unattended workstation."}, {"lang": "es", "value": "IBM Security QRadar Incident Forensics 7.2.x en versiones anteriores a 7.2.5 Patch 5 no previene el almacenamiento en cach\u00e9 de respuestas HTTPS, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos obtener informaci\u00f3n sensible de cach\u00e9 local aprovechando una estaci\u00f3n de trabajo desatendida."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D02706E6-8774-4AC8-B14C-9C671AD2AEC8"}, {"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE66EF55-6E6D-4A48-BB35-073E492EE667"}, {"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E974127A-CD24-49F9-BAE8-E158C73E5E7A"}, {"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DD31091-B460-4CDD-9060-ADC475102F15"}, {"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "199B0E14-8151-44FF-BB68-5C3F2CEA2D8E"}, {"criteria": "cpe:2.3:a:ibm:security_qradar_incident_forensics:7.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "460908EA-F6BA-4B87-89C3-F5D554D63A30"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}