René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

115 lines
3.5 KiB
JSON

{
"id": "CVE-2018-10508",
"sourceIdentifier": "security@trendmicro.com",
"published": "2018-06-12T17:29:00.303",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Trend Micro OfficeScan 11.0 SP1 y XG podr\u00eda permitir que un atacante emplee una URL especialmente manipulada para elevar los permisos de la cuenta en instalaciones vulnerables. El atacante tiene que tener al menos privilegios de invitado para explotar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "CFFB25C1-828D-49C4-825D-43AF1A2B7A55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*",
"matchCriteriaId": "602A0266-B586-447A-A500-1145B77053E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*",
"matchCriteriaId": "64600B42-4884-41F2-A683-AE1EDB79372E"
}
]
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/solution/1119961",
"source": "security@trendmicro.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}