mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
126 lines
4.1 KiB
JSON
126 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2010-0897",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2010-04-13T22:30:01.570",
|
|
"lastModified": "2017-08-17T01:32:09.850",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the Sun Java System Directory Server component in Oracle Sun Product Suite 5.2, 6.0, 6.1, 6.2, 6.3, and 6.3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Directory Service Markup Language."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en el componente Sun Java System Directory Server en Oracle Product Suite v5.2, v6.0, v6.1, v6.2, v6.3, y v6.3.1 permite a atacantes remotos afectar a la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos relacionados con el Lenguaje de marcado del servicio de directorio (DSML)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B43EF344-D808-4140-B4E2-AF2C856C2BA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1F058E7-CF00-459E-AAC2-A18E09EFB207"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3849EA32-7643-47F7-99DE-2593A7185E1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBB48FE7-9F3F-4759-A2EC-19E151433117"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0FAEBF55-5132-4BBA-85ED-BD6BB757D55D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:sun_products_suite:6.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E2BBE60-43C8-47BB-AE7D-C94476DEE600"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-276210-1",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/39453",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57746",
|
|
"source": "secalert_us@oracle.com"
|
|
}
|
|
]
|
|
} |