mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
223 lines
7.2 KiB
JSON
223 lines
7.2 KiB
JSON
{
|
|
"id": "CVE-2005-2646",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-08-23T04:00:00.000",
|
|
"lastModified": "2025-04-03T01:03:51.193",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unknown vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to cause a denial of service or read files via unknown vectors involving crafted HTTP requests."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
|
"baseScore": 6.4,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_220:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8590CB4-6437-4198-8D91-3AC1D8E89B23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_230:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E394086F-8CFD-403D-A531-0C3FFE934565"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_240:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2101594-5D83-4C12-B5D5-9203FE2FD720"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_255:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66D2D9C0-DC09-48E6-96BB-75C2556F0B8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_265:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6DAC793-6BAB-4816-849F-0450E8822161"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_332:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87C4FC0A-5D67-411F-A759-EEEA7FDECF4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_340:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64ECBC0D-65C3-4536-B5CA-6192DBBE4630"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_420:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F5D7F1E-54BE-4133-AC2B-106F6E2EC712"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_425:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B10F5ABC-3189-4FD8-ACB7-DA59375CB50B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_426:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31341E77-3A7F-489F-AB60-F2773DD204F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_430:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B56B4998-07E7-465B-8C27-1A68A9840A09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_432:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A00971-F133-4AEB-B518-28779855A386"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_440:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DED98FB-1A2C-45A1-A295-766326F24A3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_460:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDFD7441-5745-487A-9BA0-A1E78D6AC0C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_470:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "732B68E0-F4FD-41B4-8877-72A296A66547"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_480:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AB6AB90-FB39-465F-8AF5-7C12C2181DFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_490:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "312C9D9D-A26E-4FAF-A598-A6D29D6BA672"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_535:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "945E57F1-7164-4B75-A135-E05062FF0A3F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_545:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "540F4384-01AA-48E2-8677-5BF444D7B0E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:xerox:document_centre_555:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A805752-05C3-4CAA-99C7-4C28EF979D67"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/16467",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1014720",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_008.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_009.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/16467",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1014720",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_008.pdf",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_009.pdf",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |