Vulnerability Details : CVE-2011-1560
solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.
Exploit prediction scoring system (EPSS) score for CVE-2011-1560
Probability of exploitation activity in the next 30 days: 1.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1560
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2011-1560
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1560
-
http://www.zerodayinitiative.com/advisories/ZDI-11-115/
ZDI-11-115 | Zero Day Initiative
-
http://www.ibm.com/support/docview.wss?uid=swg21474552
IBM notice: The page you requested cannot be displayedVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66455
IBM solidDB allows bypassing of user authentication CVE-2011-1560 Vulnerability Report
-
http://www.vupen.com/english/advisories/2011/0854
Webmail | OVH- OVH
Products affected by CVE-2011-1560
- cpe:2.3:a:ibm:soliddb:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.178:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.175:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.173:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.169:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.168:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.30.0039:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.176:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.30.0040:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.167:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.30.0044:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:4.5.179:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:soliddb:6.3.38:*:*:*:*:*:*:*