137 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2002-0712",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-02-03T05:00:00.000",
"lastModified": "2024-11-20T23:39:41.883",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Entrust Authority Security Manager (EASM) 6.0 does not properly require multiple master users to change the password of a master user, which could allow a master user to perform operations that require multiple authorizations."
},
{
"lang": "es",
"value": "Entrust Authority Security Manager (EASM) 6.0 no requiere que m\u00faltiples usuarios m\u00e1ster cambien el password de un usuario m\u00e1ster, lo que permitir\u00eda que un usuario master ejecute operaciones que requieren autorizaci\u00f3n m\u00faltiple."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 2.1,
2023-04-24 12:24:31 +02:00
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:entrust:entrust_authority_security_manager:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C76D126-F85B-435A-B761-F28FE8EDC147"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:entrust:entrust_authority_security_manager:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D7C7A2-0468-4905-9669-C0EEF1094721"
}
]
}
]
}
],
"references": [
{
"url": "http://www.kb.cert.org/vuls/id/720017",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/AAMN-5KKVXC",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/7284",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11724",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/720017",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/AAMN-5KKVXC",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/7284",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11724",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}