Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:avira:password_manager:2.18.4:*:*:*:*:safari:*:*", "matchCriteriaId": "036D4EFA-5735-4CDC-927E-FDAFFC20AD58", "vulnerable": true}, {"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:edge:*:*", "matchCriteriaId": "914F107C-0D3D-426A-803E-09F302F126FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3847:*:*:*:*:opera:*:*", "matchCriteriaId": "704A646E-ACD2-46D4-B380-8DD8BEE11FD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.3868:*:*:*:*:chrome:*:*", "matchCriteriaId": "67A7F636-3C8C-48AD-965A-9F21A48FD607", "vulnerable": true}, {"criteria": "cpe:2.3:a:avira:password_manager:2.18.4.38471:*:*:*:*:firefox:*:*", "matchCriteriaId": "0804892E-24B4-4F8C-9E8B-1FE1FD899A2C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari."}, {"lang": "es", "value": "Una vulnerabilidad en las extensiones de navegador de Avira Password Manager ofrec\u00eda una posible laguna en la que, si un usuario visitaba una p\u00e1gina dise\u00f1ada por un atacante, la vulnerabilidad detectada pod\u00eda hacer que la extensi\u00f3n de Password Manager rellenara el campo de la contrase\u00f1a autom\u00e1ticamente. Un atacante podr\u00eda entonces acceder a esta informaci\u00f3n por medio de JavaScript. El problema ha sido corregido con la versi\u00f3n 2.18.5 de las extensiones del navegador para Chrome, MS Edge, Opera, Firefox y Safari"}], "id": "CVE-2022-28795", "lastModified": "2024-11-21T06:57:57.023", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-04-12T17:15:10.940", "references": [{"source": "security@nortonlifelock.com", "tags": ["Third Party Advisory"], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html"}], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}