mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
87 lines
3.0 KiB
JSON
87 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2007-5419",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-10-12T21:17:00.000",
|
|
"lastModified": "2018-10-15T21:44:40.767",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming traffic from remote attackers, as demonstrated by setting up a virtual server on port 80, which allows remote attackers to access the web management interface."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El router 3Com 3CRWER100-75 con software 1.2.10ww, cuando se encuentra activada la opci\u00f3n de servidor virtual, configura este servidor para aceptar todas las fuentes IP sobre el interfaz externo (Internet) al menos que el usuario seleccione otras opciones, lo cual podria exponer al routera tr\u00e1fico de entrada no intencionado desde ataques remotos, como se demostr\u00f3 a trav\u00e9s de la configuraci\u00f3n de un servidor virtual sobre el puerto 80, lo cual podr\u00eda permitir a atacantes remotos acceder al interfaz de gesti\u00f3n web."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-16"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:3com:3crwe554g72t:3crwer100-75:*:1.2.10ww:*:*:*:*:*",
|
|
"matchCriteriaId": "2A4B2130-B26C-454F-9BFD-7A3AFF32BCF2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3217",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/481977/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26009",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |