cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-20532,https://securityvulnerability.io/vulnerability/CVE-2021-20532,,IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 could allow a local user to escalate their privileges to take full control of the system due to insecure directory permissions. IBM X-Force ID: 198811.,IBM,Spectrum Protect For Virtual Environments,7.4,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-04-26T17:15:00.000Z,0 CVE-2018-2025,https://securityvulnerability.io/vulnerability/CVE-2018-2025,,IBM Spectrum Protect Backup-Archive Client and IBM Spectrum Protect for Virtual Environments 7.1 and 8.1 creates directories/files in the CIT sub directory that are read/writable by everyone. IBM X-Force ID: 155551.,IBM,"Spectrum Protect Backup-archive Client,Spectrum Protect For Virtual Environments",5.1,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-22T00:00:00.000Z,0 CVE-2018-1447,https://securityvulnerability.io/vulnerability/CVE-2018-1447,,"The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.",IBM,"Spectrum Protect,Spectrum Protect Snapshot,Spectrum Protect For Virtual Environments,Spectrum Protect For Space Management",5.1,MEDIUM,0.005330000072717667,false,,false,false,false,,,false,false,,2018-04-04T18:29:00.000Z,0 CVE-2017-1378,https://securityvulnerability.io/vulnerability/CVE-2017-1378,,IBM Spectrum Protect 7.1 and 8.1 (formerly Tivoli Storage Manager) disclosed unencrypted login credentials to Vmware vCenter in the application trace output which could be obtained by a local user. IBM X-Force ID: 126875.,IBM,Spectrum Protect For Virtual Environments,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-10-05T17:29:00.000Z,0 CVE-2015-7426,https://securityvulnerability.io/vulnerability/CVE-2015-7426,,The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.3.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors.,IBM,"Spectrum Protect For Virtual Environments,Spectrum Protect Snapshot",10,CRITICAL,0.02232000045478344,false,,false,false,false,,,false,false,,2016-01-02T21:00:00.000Z,0 CVE-2015-7429,https://securityvulnerability.io/vulnerability/CVE-2015-7429,,The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.4 allows remote authenticated users to restore arbitrary virtual machines and consequently obtain sensitive information by visiting the vSphere inventory.,IBM,"Spectrum Protect For Virtual Environments,Spectrum Protect Snapshot",8.5,HIGH,0.0011099999537691474,false,,false,false,false,,,false,false,,2016-01-02T02:00:00.000Z,0