mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
120 lines
3.4 KiB
JSON
120 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2008-6886",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-08-03T14:30:00.420",
|
|
"lastModified": "2017-08-17T01:29:38.723",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "RSA EnVision 3.5.0, 3.5.1, 3.5.2, and 3.7.0 does not properly restrict access to unspecified user profile functionality, which allows remote attackers to obtain the administrator password hash and conduct brute force guessing attacks."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "RSA EnVision v3.5.0, v3.5.1, v3.5.2, y v3.7.0 no restringe el acceso correctamente a una funcionalidad de perfil de usuario no especificada, permitiendo a atacantes remotos obtener el hash de la contrase\u00f1a de administrador y llevar a cabo ataques para revelar mediante fuerza bruta."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rsa:envision:3.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D09DC51-1615-471B-867D-737142885FBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rsa:envision:3.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EAFAE772-8245-4AC5-AF5B-1E4F0E19661D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rsa:envision:3.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "195FFEF0-BF85-427E-AB63-BEE858F36B17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rsa:envision:3.7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00A2B824-4429-41A6-A9EE-32A1E6D7C9CA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=122765140110581&w=2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.secfault.org/?p=78",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/32473",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/3288",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46884",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |