mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
121 lines
4.0 KiB
JSON
121 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2011-3014",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-08-09T22:55:01.073",
|
|
"lastModified": "2017-08-29T01:29:54.147",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not properly restrict caching of HTTPS responses, which makes it easier for remote attackers to obtain sensitive information by leveraging an unattended workstation."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Mobility Pack en versiones anteriores a la 1.2 de Novell Data Synchronizer 1.x hasta la 1.1.2 build 428 no restringe apropiadamente el \"cacheo\" de las respuestas HTTPS, lo que facilita a atacantes remotos obtener informaci\u00f3n confidencial utilizando una estaci\u00f3n de trabajo desatendida."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5579D41A-0967-44DD-A961-C815DA8E4940"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06FF70F0-D02D-44C2-B5A4-A6AF9C0140F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A10395C5-8191-49B8-83A5-196EC4DFC171"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:data_synchronizer:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A6CD40A-4EA1-460E-B365-2E9CD8FFEED3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "357FC59C-67DC-4A4A-A53A-8B0C6AE631DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "400890BC-2A6E-4AF4-8046-E1AEFD46206A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4AFFC40-B1C0-4309-8539-E845E07A1F5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:mobility_pack:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF03F557-EC68-4E2B-B288-E3A2F505DEB2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.novell.com/support/viewContent.do?externalId=7009057",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69167",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |