IBM dashDB Local uses hard-coded credentials that could allow a remote attacker to gain access to the Docker container or database.
References
| Link | Resource |
|---|---|
| http://www.ibm.com/support/docview.wss?uid=swg21994471 | Patch Vendor Advisory |
| http://www.securityfocus.com/bid/95628 | Third Party Advisory VDB Entry |
| http://www.ibm.com/support/docview.wss?uid=swg21994471 | Patch Vendor Advisory |
| http://www.securityfocus.com/bid/95628 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.ibm.com/support/docview.wss?uid=swg21994471 - Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/95628 - Third Party Advisory, VDB Entry |
Information
Published : 2017-02-08 22:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-8954
Mitre link : CVE-2016-8954
CVE.ORG link : CVE-2016-8954
JSON object : View
Products Affected
ibm
- dashdb_local
CWE
CWE-798
Use of Hard-coded Credentials
