113 lines
3.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-2118",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2015-05-25T17:59:01.310",
"lastModified": "2019-10-09T23:13:29.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Secure Pull Print and Security Pull Print components in HP Access Control (AC) Software 12.x through 14.x before 14.1.2 allows remote authenticated users to obtain sensitive information via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en los componentes Secure Pull Print y Security Pull Print en Software HP Access Control (AC) Software 12.x hasta 14.x anterior a 14.1.2 permite a usuarios remotos autenticados obtener informaci\u00f3n sensible a trav\u00e9s de vectores desconocidos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A77D27F-80B0-42EA-BF79-3BC90F405618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8749D08D-28DF-4DDA-923C-7C1CFFAA36E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8D3A04-BE2F-4182-BD0E-CFC10D8EB8D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "83CCAFBE-3418-4A04-AC2E-954369164742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC2D965-577E-4C1C-B5F8-F5B2E29F720C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F46403-D97D-4D03-B4A5-17B90A2D1104"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD1A79D-3DC3-451F-A0D9-AC0CB3B7CEF6"
}
]
}
]
}
],
"references": [
{
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315",
"source": "hp-security-alert@hp.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}