mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
134 lines
4.4 KiB
JSON
134 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2015-2113",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2015-04-14T22:59:15.400",
|
|
"lastModified": "2019-10-09T23:13:28.847",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in HP Easy Deploy, as distributed standalone and in HP Easy Tools before 3.0.1.1650, on HP Thin Client t5540, t5740, and t5740e devices and HP Flexible Thin Client t510, t520, t610, t620, and t820 devices allows remote attackers to execute arbitrary code via unknown vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en HP Easy Deploy, distribuido en standalone y en HP Easy Tools anterior a 3.0.1.1650, en dispositivos HP Thin Client t5540, t5740 y t5740e y en dispositivos HP Flexible Thin Client t510, t520, t610, t620 y t820 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:easy_tools:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.0.1",
|
|
"matchCriteriaId": "FB10D374-10DC-486D-8DEA-3E15FEF9A94B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t510:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42371CE4-585D-478D-B4F3-C3F8543BD9CA"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t520:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A722663C-5DD9-493B-9FBE-7EB415DF253B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t5540:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E90D8BE6-5CFB-40FA-A95F-931999233972"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t5740:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B5D2CFE-531F-40F0-8739-AA4E888D4F30"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t5740e:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D88D452C-79B3-4F36-AA4B-22A3FF437BE7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t610:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AA3946F-F8D1-4D50-BC25-3B99415311A5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t620:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F96553C6-EA74-4445-9266-7A4B41A963C9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t820:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F1CF6C2-979E-4A62-AAAE-99E48436271A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/73964",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |