Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:*:*:*:*:*:*:*:*", "matchCriteriaId": "06154DF2-11C1-4D1E-8FD2-30258CCDFA38", "versionEndIncluding": "8.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:8.7:*:*:*:*:*:*:*", "matchCriteriaId": "41B6A77E-1686-44A6-B1E4-AC63A0466AE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "FBAC9796-BA52-48AF-9326-3C2343BE2342", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D705DD1-8F24-49B4-8D05-F0403A625016", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0a:*:*:*:*:*:*:*", "matchCriteriaId": "4A2BAB44-B859-4209-BAFD-088E9583F31B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D66B990-2034-46D9-AF8D-DE69B3161F38", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1a:*:*:*:*:*:*:*", "matchCriteriaId": "50EC1311-629F-401B-9AE3-8ECDE0CBF330", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AFA47D5-AC5B-4A1B-83A6-EE5D49ECE489", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2a:*:*:*:*:*:*:*", "matchCriteriaId": "F5FE2E49-88CF-4D61-8097-B3146A47BAED", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in the replay server in IBM Tealeaf Customer Experience before 8.7.1.8818, 8.8 before 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 before 9.0.1.1083, 9.0.1A before 9.0.1.5073, 9.0.2 before 9.0.2.1095, and 9.0.2A before 9.0.2.5144 allows remote attackers to read arbitrary files via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en el servidor de repetici\u00f3n en IBM Tealeaf Customer Experience en versiones anteriores a 8.7.1.8818, 8.8 en versiones anteriores a 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 en versiones anteriores a 9.0.1.1083, 9.0.1A en versiones anteriores a 9.0.1.5073, 9.0.2 en versiones anteriores a 9.0.2.1095 y 9.0.2A en versiones anteriores a 9.0.2.5144 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de vectores no especificados."}], "id": "CVE-2015-4988", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary"}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-01-18T05:59:02.460", "references": [{"source": "psirt@us.ibm.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968868"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968868"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}