145 lines
3.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2002-1869",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2024-02-15T20:19:21.360",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Analyzed",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Heysoft EventSave 5.1 and 5.2 and Heysoft EventSave+ 5.1 and 5.2 does not check whether the log file can be written to, which allows attackers to prevent events from being recorded by opening the log file using an application such as Microsoft's Event Viewer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
2023-04-24 12:24:31 +02:00
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heysoft:eventsave:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3904208-D3EA-4F05-8F6A-58C568B9DBAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heysoft:eventsave:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F602B9C7-4B4B-4609-8557-9AC9C6A34604"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heysoft:eventsave\\+:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "24B81803-B579-4BD1-8661-9CE8C6BE5E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heysoft:eventsave\\+:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83A27D19-2E44-4444-BC50-970FEB6DA0A9"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1005517",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
2023-04-24 12:24:31 +02:00
]
},
{
"url": "http://www.heysoft.de/nt/eventlog/hsb01e.htm",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Patch"
]
},
{
"url": "http://www.iss.net/security_center/static/10535.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/6095",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
2023-04-24 12:24:31 +02:00
]
}
]
}