Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zenprise:zenprise_device_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4069641D-E045-47A7-8E79-76348EB0D6E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:zenprise:zenprise_device_manager:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "52B2CEB2-F213-4AC1-8F0B-DEB220E6DA52", "vulnerable": true}, {"criteria": "cpe:2.3:a:zenprise:zenprise_device_manager:6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CC540549-862A-43B3-86FA-2EDF450CC034", "vulnerable": true}, {"criteria": "cpe:2.3:a:zenprise:zenprise_device_manager:6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5336DEB9-7141-47A1-8B1F-93DC9BDCC5E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:zenprise:zenprise_device_manager:6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D3ACACB-93D6-487F-8F75-CAD2A96FA23C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the web console in Zenprise Device Manager 6.x through 6.1.8 allows remote attackers to hijack the authentication of administrators for requests that wipe mobile devices."}, {"lang": "es", "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados en la consola web en Zenprise Device Manager v6.x hasta v6.1.8, permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones que limpien dispositivos m\u00f3viles"}], "id": "CVE-2011-4498", "lastModified": "2024-11-21T01:32:25.353", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-11-21T11:55:04.697", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/584363"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.zenpriseportal.com/patches/ZP_SecPatch_618_9995.zip"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/584363"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.zenpriseportal.com/patches/ZP_SecPatch_618_9995.zip"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}