mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
121 lines
3.9 KiB
JSON
121 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2011-2223",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-08-09T22:55:00.857",
|
|
"lastModified": "2015-10-29T15:51:17.180",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 sends the Admin LDAP password in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Mobility Pack en versiones anteriores a la 1.2 de Novell Data Synchronizer 1.x hasta la 1.1.2 build 428 envia la contrase\u00f1a Admin de LDAP en texto claro, lo que permite a atacantes remotos obtener informaci\u00f3n confidencial analizando el tr\u00e1fico de red."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-310"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5579D41A-0967-44DD-A961-C815DA8E4940"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06FF70F0-D02D-44C2-B5A4-A6AF9C0140F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A10395C5-8191-49B8-83A5-196EC4DFC171"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A6CD40A-4EA1-460E-B365-2E9CD8FFEED3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "357FC59C-67DC-4A4A-A53A-8B0C6AE631DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "400890BC-2A6E-4AF4-8046-E1AEFD46206A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4AFFC40-B1C0-4309-8539-E845E07A1F5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF03F557-EC68-4E2B-B288-E3A2F505DEB2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.novell.com/support/viewContent.do?externalId=7009055",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/49069",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |