cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-6046,https://securityvulnerability.io/vulnerability/CVE-2016-6046,,IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.,IBM,Tivoli Storage Manager Extended Edition,5.4,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2017-02-01T20:00:00.000Z,0 CVE-2016-6044,https://securityvulnerability.io/vulnerability/CVE-2016-6044,,"IBM Tivoli Storage Manager Operations Center could allow an authenticated attacker to enable or disable the application's REST API, which may let the attacker violate security policy.",IBM,Tivoli Storage Manager Extended Edition,4.3,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2017-02-01T20:00:00.000Z,0 CVE-2016-6043,https://securityvulnerability.io/vulnerability/CVE-2016-6043,,Tivoli Storage Manager Operations Center could allow a local user to take over a previously logged in user due to session expiration not being enforced.,IBM,Tivoli Storage Manager Extended Edition,7,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-02-01T20:00:00.000Z,0 CVE-2016-6045,https://securityvulnerability.io/vulnerability/CVE-2016-6045,,IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.,IBM,Tivoli Storage Manager Extended Edition,8.8,HIGH,0.0012400000123307109,false,,false,false,false,,,false,false,,2017-02-01T20:00:00.000Z,0