Show plain JSON{"id": "CVE-2015-8326", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.5, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 1.8}]}, "published": "2017-06-07T14:29:00.383", "references": [{"url": "http://www.openwall.com/lists/oss-security/2015/11/24/10", "tags": ["Mailing List", "Patch", "Third Party Advisory"], "source": "security@debian.org"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267962", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "security@debian.org"}, {"url": "https://github.com/mtrmac/IPTables-Parse/commit/b400b976d81140f6971132e94eb7657b5b0a2b87", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "source": "security@debian.org"}, {"url": "https://metacpan.org/source/MRASH/IPTables-Parse-1.6/Changes", "tags": ["Release Notes", "Third Party Advisory"], "source": "security@debian.org"}, {"url": "http://www.openwall.com/lists/oss-security/2015/11/24/10", "tags": ["Mailing List", "Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1267962", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/mtrmac/IPTables-Parse/commit/b400b976d81140f6971132e94eb7657b5b0a2b87", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://metacpan.org/source/MRASH/IPTables-Parse-1.6/Changes", "tags": ["Release Notes", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-59"}]}], "descriptions": [{"lang": "en", "value": "The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user."}, {"lang": "es", "value": "El m\u00f3dulo IPTables-Parse anterior a la versi\u00f3n 1.6 para Perl permite a los usuarios locales escribir en archivos arbitrarios propiedad del usuario actual."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:0.5:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "C0392A3A-4BA5-48DD-A851-1A737F20C22B"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:0.6:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "BB6FF281-9EAE-4240-8740-FE31E02D17F0"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:0.7:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "2904B020-4A02-4AB7-AD09-7DCAB048EAFE"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:0.8:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "E4D7C1F2-21A7-4140-AAC5-D0400C259456"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:0.9:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "CF0DE2F1-EFD1-40B6-A27E-016F7DCE9314"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.0:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "4D9FFA74-56B3-4D40-B713-817ADC984B25"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.1:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "C85ABB2B-A89E-4EDF-801B-D53FB49D52AF"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.3:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "5EAB55E5-A0F0-4D6E-8BF5-BD7BCA5AE827"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.3.1:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "6B39BE62-5935-4323-9AE4-0475BC9D685C"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.4:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "3DD514E6-FC42-4FFD-B06D-B3E8E914BEB0"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.5:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "913ECFB5-165D-41D5-960F-97E966A8C9CF"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.6:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "112A567E-2D69-4916-86E3-3CE9BEAE7558"}, {"criteria": "cpe:2.3:a:iptables-parse_project:iptables-parse_module:1.6.1:*:*:*:*:perl:*:*", "vulnerable": true, "matchCriteriaId": "685569AF-DA47-43D3-87B6-960D681DB39D"}], "operator": "OR"}]}], "sourceIdentifier": "security@debian.org"}