René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.0 KiB
JSON

{
"id": "CVE-2015-2959",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2015-06-09T00:59:01.353",
"lastModified": "2016-12-31T02:59:25.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Zoho NetFlow Analyzer build 10250 and earlier does not check for administrative authorization, which allows remote attackers to obtain sensitive information, modify passwords, or remove accounts by leveraging the guest role."
},
{
"lang": "es",
"value": "Zoho NetFlow Analyzer build 10250 y anteriores no comprueba para la autorizaci\u00f3n administrativa, lo que permite a atacantes remotos obtener informaci\u00f3n sensible, modificar contrase\u00f1as o eliminar cuentas mediante el aprovechamiento del role de invitado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0940949F-4EB4-460B-8CE9-56B6387250F3"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN25598413/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000075",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75065",
"source": "vultures@jpcert.or.jp"
},
{
"url": "http://www.securitytracker.com/id/1032516",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerability-fix-for-fails-to-restrict-access-permissions-cross-site-scripting-cross-site-request-forgery-over-build-10250",
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}