2024-12-08 03:06:42 +00:00

219 lines
7.1 KiB
JSON

{
"id": "CVE-2008-1330",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-18T17:44:00.000",
"lastModified": "2024-11-21T00:44:17.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Windows client API in Novell GroupWise 7 before SP3 and 6.5 before SP6 Update 3 allows remote authenticated users to access the non-shared stored e-mail messages of another user who has shared at least one folder with the attacker."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en Windows client API de Novell GroupWise 7 antes de SP3 y 6.5 antes de SP6 Update 3 permite a usuarios remotamente autentificados acceder a los emails no compartidos almacenados de otro usuario que haya compartido al menos una carpeta con el atacante."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-264"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD18143-9962-4C0D-AD3D-66C0CF3FB5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp1:*:*:*:*:*:*",
"matchCriteriaId": "08A78BE7-6426-41CD-BBAF-9BB951726D33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "E50599E1-45E5-443F-AAEC-F91778CA4792"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "F0BB62B7-C895-4AB6-9CEB-4B312E334953"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp4:*:*:*:*:*:*",
"matchCriteriaId": "A91EAC4C-8EEE-4050-B1AD-E677AD90327D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp5:*:*:*:*:*:*",
"matchCriteriaId": "C7F65030-60A2-4EC2-A06D-EC5249FD9FA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5:sp6:*:*:*:*:*:*",
"matchCriteriaId": "8CB8A6AD-94E4-4871-9BCA-EC637161E70D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "814CAE15-78D8-4205-AC95-E07385A7B3DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "251EAE31-9799-453A-ABF7-F3D1C6602A81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AFA45E-7EA4-4067-BDB5-AB4391B3FE65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8BA202-8147-4837-8C14-C7A60E70EFEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D61CB70-5B89-4D12-AA31-9C4BF9A41813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:6.5_sp6_update_1:*:*:*:*:*:*:*",
"matchCriteriaId": "7488A4DC-3A7E-4492-9EC7-2443CEB18E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE640E9A-762B-4AF4-8677-818CBF16EA4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:7.0.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "422F4B8A-8133-4DE2-9749-41E3DE0031DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:groupwise:7.0.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "DD25DC76-F3BE-4A0E-86DC-D27F4948446E"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/29409",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1019616",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28265",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0904",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41223",
"source": "cve@mitre.org"
},
{
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/732/3263374_f.SAL_Public.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/29409",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1019616",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/28265",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0904",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41223",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/732/3263374_f.SAL_Public.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}