79 lines
2.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-3581",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-05T20:30:00.000",
"lastModified": "2008-11-15T06:53:16.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Jedox Palo 1.5 client transmits the password in cleartext, which might allow remote attackers to obtain the password by sniffing the network, as demonstrated by starting Excel with the Palo plugin, opening a cube, and performing an Insert View."
},
{
"lang": "es",
"value": "El cliente Jedox Palo 1.5 transmite la contrase\u00f1a en texto claro, lo cual podr\u00eda permitir a usuarios remotos obtener la contrase\u00f1a husmeando la red, como se ha demostrado iniciando Excel con la extensi\u00f3n Palo, abriendo un cubo, y realizando una acci\u00f3n Insertar Vista."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jedox:palo:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "65834E52-0076-43A1-B859-B001DBC4BF34"
}
]
}
]
}
],
"references": [
{
"url": "http://85.10.222.122/mantis/public_show_bug.php?bug_id=452",
"source": "cve@mitre.org"
}
]
}