René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
3.6 KiB
JSON

{
"id": "CVE-2015-6237",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-27T19:29:00.223",
"lastModified": "2018-10-09T19:57:48.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The RPC service in Tripwire (formerly nCircle) IP360 VnE Manager 7.2.2 before 7.2.6 allows remote attackers to bypass authentication and (1) enumerate users, (2) reset passwords, or (3) manipulate IP filter restrictions via crafted \"privileged commands.\""
},
{
"lang": "es",
"value": "El servicio RPC en Tripwire (anteriormente conocido como nCircle) IP360 VnE Manager, en versiones 7.2.2 anteriores a la 7.2.6 permite que atacantes remotos omitan la autenticaci\u00f3n y (1) enumeren usuarios, (2) restablezcan contrase\u00f1as o (3) manipulen las restricciones de filtros IP mediante \"comandos privilegiados\" manipulados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F140F9C-0FDB-42F1-9AB3-06B670D1FD20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C21FA217-0202-4885-955B-C4DDF8B0FEE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9AA1C3-B17E-4F12-A587-767D7A25B048"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2015/Oct/20",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/536609/100/0/threaded",
"source": "cve@mitre.org"
}
]
}