Show plain JSON{"id": "CVE-2008-4278", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-10-06T19:54:36.483", "references": [{"url": "http://marc.info/?l=bugtraq&m=122331139823057&w=2", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/32179", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/32180", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31569", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1020992", "source": "cve@mitre.org"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/2740", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45664", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=122331139823057&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/32179", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/32180", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31569", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1020992", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/2740", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45664", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "VMware VirtualCenter 2.5 before Update 3 build 119838 on Windows displays a user's password in cleartext when the password contains unspecified special characters, which allows physically proximate attackers to steal the password."}, {"lang": "es", "value": "VMware VirtualCenter 2.5 antes de la actualizaci\u00f3n 3 build 119838 sobre Windows muestra la contrase\u00f1a de un usuario en texto sin formato cuando la contrase\u00f1a contiene caracteres especiales no especificados, lo cual permite robar la contrase\u00f1a a atacantes f\u00edsicamente pr\u00f3ximos."}], "lastModified": "2024-11-21T00:51:18.003", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:virtual_infrastructure_client:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9A303926-5369-413E-93AB-FF3337B790D9"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:*:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A5B6A72-ACC7-4320-BD95-F555ACE3B71B", "versionEndIncluding": "2.5"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CE3C34C-EC77-4C5B-8B0C-130BAF2776D4"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0:unknown:client:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "65811F69-FE15-44EB-A6BD-DAC10698047D"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B422C79D-ACB5-4650-9542-0AA562296286"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFF5385-64AA-48AD-A5FE-25918E4F07D6"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.2:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E15CB55D-DE86-4A1F-90E8-BEC3ABBF256B"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.2:update_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CE6C817-1129-4570-9F04-1FC7EA42FBA5"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.0.2:update_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "181F6A06-A95F-401D-B835-F630722064F4"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17E8DFD-AC99-45E6-81F9-ED66369FBD0A"}, {"criteria": "cpe:2.3:a:vmware:virtualcenter:2.5:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3AB56C1-35F2-448D-9EB7-35FB4E00C227"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}