mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
120 lines
4.0 KiB
JSON
120 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2008-2432",
|
|
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
|
|
"published": "2008-11-26T01:30:00.390",
|
|
"lastModified": "2008-11-26T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de m\u00e9todo inseguro en el m\u00e9todo GetFileList en un control ActiveX no especificado en Novell iPrint Client anterior a v5.06 permite a atacantes remotos listar los archivos de imagen en un directorio de su elecci\u00f3n mediante un nombre de directorio en el argumento."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.04",
|
|
"matchCriteriaId": "A5538B39-4C1E-42AE-9B93-6203C77A9C91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/30813",
|
|
"source": "PSIRT-CNA@flexerasoftware.com"
|
|
}
|
|
]
|
|
} |