René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.6 KiB
JSON

{
"id": "CVE-2015-2118",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2015-05-25T17:59:01.310",
"lastModified": "2019-10-09T23:13:29.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Secure Pull Print and Security Pull Print components in HP Access Control (AC) Software 12.x through 14.x before 14.1.2 allows remote authenticated users to obtain sensitive information via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en los componentes Secure Pull Print y Security Pull Print en Software HP Access Control (AC) Software 12.x hasta 14.x anterior a 14.1.2 permite a usuarios remotos autenticados obtener informaci\u00f3n sensible a trav\u00e9s de vectores desconocidos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A77D27F-80B0-42EA-BF79-3BC90F405618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8749D08D-28DF-4DDA-923C-7C1CFFAA36E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8D3A04-BE2F-4182-BD0E-CFC10D8EB8D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "83CCAFBE-3418-4A04-AC2E-954369164742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC2D965-577E-4C1C-B5F8-F5B2E29F720C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F46403-D97D-4D03-B4A5-17B90A2D1104"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:access_control:14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD1A79D-3DC3-451F-A0D9-AC0CB3B7CEF6"
}
]
}
]
}
],
"references": [
{
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315",
"source": "hp-security-alert@hp.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}