Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:meteocontrol:web\\'log_basic_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "F464A7F9-0F62-4A25-A1B7-D46CD10795FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:meteocontrol:web\\'log_light:-:*:*:*:*:*:*:*", "matchCriteriaId": "95A88480-463E-4F32-A8CC-A6A42E26FD6B", "vulnerable": true}, {"criteria": "cpe:2.3:a:meteocontrol:web\\'log_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C486FD1-E045-48BB-9451-D5AB446073D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:meteocontrol:web\\'log_pro_unlimited:-:*:*:*:*:*:*:*", "matchCriteriaId": "07528FD4-93AD-49DA-99DD-1FD927953F83", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited does not require authentication for \"post-admin\" login pages, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors."}, {"lang": "es", "value": "Meteocontrol WEB'log Basic 100, Light, Pro, y Pro Unlimited no requiere autenticaci\u00f3n para p\u00e1ginas de inicio de sesi\u00f3n \"post-admin\", lo que permite a atacantes remotos obtener informaci\u00f3n sensible o modificar datos a trav\u00e9s de vectores no especificados."}], "id": "CVE-2016-2296", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-05-14T16:59:02.227", "references": [{"source": "ics-cert@hq.dhs.gov", "url": "http://seclists.org/fulldisclosure/2016/May/52"}, {"source": "ics-cert@hq.dhs.gov", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01"}, {"source": "ics-cert@hq.dhs.gov", "url": "https://www.exploit-db.com/exploits/39822/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/May/52"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/39822/"}], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-254"}], "source": "nvd@nist.gov", "type": "Primary"}]}