cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2013-4024,https://securityvulnerability.io/vulnerability/CVE-2013-4024,,"IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x support HTTP access to the Web Console, which allows remote attackers to read session cookies by sniffing the network.",IBM,"Data Studio Web Console,Infosphere Optim Configuration Manager,Optim Performance Manager,Db2 Recovery Expert",,,0.0022799998987466097,false,,false,false,false,,,false,false,,2013-09-25T10:00:00.000Z,0 CVE-2013-4022,https://securityvulnerability.io/vulnerability/CVE-2013-4022,,"IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x store unspecified authentication information in a cookie, which allows remote authenticated users to bypass intended access restrictions via unknown vectors.",IBM,"Data Studio Web Console,Infosphere Optim Configuration Manager,Optim Performance Manager,Db2 Recovery Expert",,,0.0008200000156648457,false,,false,false,false,,,false,false,,2013-09-25T10:00:00.000Z,0 CVE-2013-4025,https://securityvulnerability.io/vulnerability/CVE-2013-4025,,"IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x do not have an off autocomplete attribute for the login-password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.",IBM,"Data Studio Web Console,Infosphere Optim Configuration Manager,Optim Performance Manager,Db2 Recovery Expert",,,0.0020699999295175076,false,,false,false,false,,,false,false,,2013-09-25T10:00:00.000Z,0 CVE-2013-2980,https://securityvulnerability.io/vulnerability/CVE-2013-2980,,Cross-site request forgery (CSRF) vulnerability in the Web Console in IBM Data Studio 3.1.0 and 3.1.1 allows remote attackers to hijack the authentication of arbitrary users for requests that access monitored database information.,IBM,Data Studio,,,0.0008999999845400453,false,,false,false,false,,,false,false,,2013-06-17T10:00:00.000Z,0 CVE-2013-2981,https://securityvulnerability.io/vulnerability/CVE-2013-2981,,Directory traversal vulnerability in the Web Console in IBM Data Studio 3.1.0 and 3.1.1 allows remote attackers to read arbitrary files via unspecified vectors.,IBM,Data Studio,,,0.003599999938160181,false,,false,false,false,,,false,false,,2013-06-17T10:00:00.000Z,0 CVE-2013-0467,https://securityvulnerability.io/vulnerability/CVE-2013-0467,,"IBM Eclipse Help System (IEHS), as used in IBM Data Studio 3.1 and 3.1.1 and other products, allows remote authenticated users to read source code via a crafted URL.",IBM,Data Studio,,,0.0007699999841861427,false,,false,false,false,,,false,false,,2013-02-21T01:00:00.000Z,0