René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

100 lines
2.6 KiB
JSON

{
"id": "CVE-2001-1231",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-08-14T04:00:00.000",
"lastModified": "2017-10-10T01:30:02.017",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the \"Padlock\" fix."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A61E70C4-FE03-42AA-9F9B-C8DEB3E12F34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "194704B6-4820-4398-8906-A1E529ED65AF"
}
]
}
]
}
],
"references": [
{
"url": "http://support.novell.com/padlock/details.htm",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/204672",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/3189",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6998",
"source": "cve@mitre.org"
}
]
}