René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

193 lines
7.0 KiB
JSON

{
"id": "CVE-2008-5710",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-12-24T18:29:15.813",
"lastModified": "2017-08-08T01:33:29.063",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the web management interface in Avaya Communication Manager (CM) 3.1.x, 4.0.3, and 5.x allow remote attackers to read (1) configuration files, (2) log files, (3) binary image files, and (4) help files via unknown vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades sin especificar en la interfaz de gesti\u00f3n web en Avaya Communication Manager (CM) 3.1.x, 4.0.3 y 5.x permite a atacantes remotos leer (1) archivos de configuraci\u00f3n, (2) archivos de log, (3) archivos binarios de imagen y (4) archivos de ayuda mediante vectores desconocidos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-16"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88F5C363-3A38-43FC-A06D-73E280AB844B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4030E5D-BC15-481D-A15E-98FAE65130D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FC3A86-CE3D-4C12-9E31-7F7280EF9D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD119B9-FE11-4165-943D-119E906DC013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "89F99C5C-C184-4A5C-B8BA-F558C4A38730"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*",
"matchCriteriaId": "1EAA2BC9-4794-4441-8AA8-3C1B7297FD06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*",
"matchCriteriaId": "423E4EEB-3D6F-449E-B623-C8D051E8FA3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "87089C0E-2241-46A7-93EE-EC41D52A89C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*",
"matchCriteriaId": "5BD89D61-0B42-4DDE-99F1-71570A37A136"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "825C1D4E-CD86-4122-84D7-CF1CB4CF8F10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84E2136B-6FE3-4548-A89D-444ED9393C22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "FB4B7CCA-3961-48BC-ABFD-A608B39BD921"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "F9DD5F5B-5F44-422C-B9D9-731B53981BEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "AD401628-23D0-4CC0-8D30-B10910533003"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A32A986-3DB3-4CB5-AF52-12D83C4A6B95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "223037D6-1345-4705-BB88-E814211D666D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED0CFA4-C45E-465B-9F45-EB0742305CBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "22364E59-5248-43E3-8B6A-E646188F69E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "120EA1E2-EEF0-4FF6-960D-34FF9E88F2F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:communication_manager:5.1.2:sp0:*:*:*:*:*:*",
"matchCriteriaId": "ED8A8551-7374-4A21-B141-10BE4CEF222F"
}
]
}
]
}
],
"references": [
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-394.htm",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31639",
"source": "cve@mitre.org"
},
{
"url": "http://www.voipshield.com/research-details.php?id=123",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2774",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45750",
"source": "cve@mitre.org"
}
]
}