mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
211 lines
7.2 KiB
JSON
211 lines
7.2 KiB
JSON
{
|
|
"id": "CVE-2015-5407",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2015-08-22T23:59:08.000",
|
|
"lastModified": "2016-11-28T19:33:25.867",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralView Subscription Fraud Prevention 2.0 and 2.1 allow remote attackers to obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5406 and CVE-2015-5408."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en HP CentralView Fraud Risk Management en las versiones 11.1, 11.2 y 11.3; en CentralView Revenue Leakage Control en las versiones 4.1, 4.2 y 4.3; en CentralView Dealer Performance Audit en las versiones 2.0 y 2.1; en CentralView Credit Risk Control en las versiones 2.1, 2.2 y 2.3; en CentralView Roaming Fraud Control en las versiones 2.1, 2.2 y 2.3; y en CentralView Subscription Fraud Prevention en las versiones 2.0 y 2.1, permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-5406 y CVE-2015-5408."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 1.5,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_revenue_leakage_control:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6320AA3-CB18-4B60-8242-1B1884CDAA42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_revenue_leakage_control:4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31B81159-C28F-4621-B161-5C6E9D3AD204"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_revenue_leakage_control:4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "530BDFDF-CE8D-4F49-801F-5528929614D7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_fraud_risk_management:11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E367DBD-26D5-4EC4-B7A0-03BD36357CED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_fraud_risk_management:11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "508E5D2A-A4A4-4E9E-BA77-5B16B1394A6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_fraud_risk_management:11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8EA4A40-F7BA-43EA-91CC-2C0F6920BF37"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_subscription_fraud_prevention:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E94D64DD-5769-48CB-AD86-103D8C809E0B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_subscription_fraud_prevention:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "741458DD-37BF-4EA2-9A54-8B62B11E9FD9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_dealer_performance_audit:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9736C45F-32BE-4FE8-B422-95BD8AB7EDB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_dealer_performance_audit:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E69CC17E-F744-48D1-B227-993E99E3C81A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_roaming_fraud_control:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AA91C88-9780-4522-991A-A709A395BD56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_roaming_fraud_control:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D734D014-1EB9-4A68-8DA2-40DAC8E188DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_roaming_fraud_control:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "466FB09A-1AAC-4088-B8A5-3AC729FAF822"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_credit_risk_control:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE303BB6-9767-48E1-B2C8-FF662E1081B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_credit_risk_control:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "186F8E4D-E5F0-4AB9-A0E6-1AEFDCB68B64"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:centralview_credit_risk_control:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20F25C4E-C500-41ED-9B9D-51043DFC735F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/76356",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04751893",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |