148 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2002-2066",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2024-02-08T20:13:11.917",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BestCrypt BCWipe 1.0.7 and 2.0 through 2.35.1 does not clear Windows alternate data streams that are attached to files on NTFS file systems, which allows attackers to recover sensitive information that was supposed to be deleted."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
2023-04-24 12:24:31 +02:00
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-459"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetico:bcwipe:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
2023-04-24 12:24:31 +02:00
"versionEndIncluding": "2.35.1",
"matchCriteriaId": "4D4DCCCB-6358-40FE-BD1A-2AB29934B3A2"
2023-04-24 12:24:31 +02:00
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetico:bcwipe:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "48992FF9-0E5B-43D7-8F8E-ABBE7F948686"
}
]
}
]
}
],
"references": [
{
"url": "http://www.bcwipe.com/",
"source": "cve@mitre.org",
"tags": [
"Product"
2023-04-24 12:24:31 +02:00
]
},
{
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/7953.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/251565",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://www.securityfocus.com/bid/3912",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
}
]
}