René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

110 lines
3.5 KiB
JSON

{
"id": "CVE-2015-2952",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2015-06-13T15:59:02.497",
"lastModified": "2016-12-03T03:07:22.657",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The user-information management functionality in Igreks MilkyStep Light 0.94 and earlier and Professional 1.82 and earlier allows remote authenticated users to bypass intended access restrictions and modify administrative credentials via unspecified vectors, a different vulnerability than CVE-2015-2953 and CVE-2015-2958."
},
{
"lang": "es",
"value": "La funcionalidad de la gesti\u00f3n de informaci\u00f3n del usuario en Igreks MilkyStep Light 0.94 y anteriores y Professional 1.82 y anteriores permite a usuarios remotos autenticados evadir las restricciones de acceso y modificar las credenciales administrativas a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-2953 y CVE-2015-2958."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:igreks:milkystep_light:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.94",
"matchCriteriaId": "717E9862-9C1D-4D2B-AC6A-D3068D198C03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:igreks:milkystep_professional:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.82",
"matchCriteriaId": "9BBF034A-902C-4569-BD76-4DF404FB0107"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:igreks:milkystep_professional_oem:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.82",
"matchCriteriaId": "CA50F9BC-6DD9-4A69-9FBE-5F5B4E4B71DD"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN19732015/995646/index.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "http://jvn.jp/en/jp/JVN19732015/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000077",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75184",
"source": "vultures@jpcert.or.jp"
}
]
}