René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

103 lines
3.1 KiB
JSON

{
"id": "CVE-2015-0524",
"sourceIdentifier": "security_alert@emc.com",
"published": "2015-03-12T10:59:03.583",
"lastModified": "2018-10-09T19:55:39.950",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the Gateway Provisioning service in EMC Secure Remote Services Virtual Edition (ESRS VE) 3.02 and 3.03 allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en el servicio Gateway Provisioning en EMC Secure Remote Services Virtual Edition (ESRS VE) 3.02 y 3.03 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*",
"matchCriteriaId": "01FFD337-155A-403F-9270-09A0DF8D4161"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*",
"matchCriteriaId": "0C9FDED1-65A7-44D3-A345-392F0B8C6D27"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
"source": "security_alert@emc.com"
},
{
"url": "http://seclists.org/bugtraq/2015/Mar/40",
"source": "security_alert@emc.com"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Mar/119",
"source": "security_alert@emc.com"
},
{
"url": "http://www.securityfocus.com/archive/1/534930/100/0/threaded",
"source": "security_alert@emc.com"
},
{
"url": "https://www.securify.nl/advisory/SFY20141113/emc_secure_remote_services_virtual_edition_provisioning_component_is_affected_by_sql_injection.html",
"source": "security_alert@emc.com",
"tags": [
"Exploit"
]
}
]
}