mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
96 lines
3.8 KiB
JSON
96 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2009-3339",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-09-24T16:30:01.640",
|
|
"lastModified": "2009-09-28T04:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"evaluatorComment": "Per http://www.mcafee.com/us/enterprise/products/virtualization_security/email_and_web_security_appliance_virtual.html\r\n\r\nExperience McAfee Email and Web Security Appliance through the power of virtualization\r\n\r\nWe\u2019ve made it easier than ever to evaluate McAfee Email and Web Security Appliance, our email and web security appliance. Thanks to VMware virtualization technology, you can download a free 30-day software trial\u2014with all of the features and functionality of the appliance. Install it on your server and experience uncompromising protection against spam, phishing, viruses, spyware, and more.",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in McAfee Email and Web Security Appliance 5.1 VMtrial allows remote attackers to read arbitrary files via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en McAfee Email y Web Security Appliance v5.1 VMtrial permite a los atacantes remotos leer arbitrariamente archivos a trav\u00e9s de vectores desconocidos, como se demuestra en un cierto m\u00f3dulo en VulnDisco Pack Professional v8.9 hasta v8.11. NOTA: como en 20090917, esta informaci\u00f3n no tiene informaci\u00f3n de la acci\u00f3n. Sin embargo, debido a que el autor VulnDisco Pack es un investigador confiable, se le ha asignado un identificador CVE con fines de seguimiento."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mcafee:email_and_web_security_appliance:5.1:-:vmtrial:*:*:*:*:*",
|
|
"matchCriteriaId": "F74E6F29-D3AE-4FCD-B87C-4CFCA4795761"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:mcafee:email_and_web_security_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "400C7DFE-129B-4BDB-8437-933FAAE01A6D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://intevydis.com/vd-list.shtml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1022829",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |