Search criteria

6 vulnerabilities found for wisepoint by falconsc

FKIE_CVE-2016-1177

Vulnerability from fkie_nvd - Published: 2016-04-05 18:59 - Updated: 2025-04-12 10:46
Summary
The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors.
Impacted products
Vendor Product Version
falconsc wisepoint *
falconsc wisepoint_authenticator *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "862AB2D6-D086-44D2-B6E0-0220062705EF",
              "versionEndIncluding": "4.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint_authenticator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "728F8C29-5F88-4B8D-B5F3-FD4B61026A46",
              "versionEndIncluding": "4.1.19.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "La pantalla de administraci\u00f3n en Falcon WisePoint 4.3.1 y versiones anteriores y WisePoint Authenticator 4.1.19.22 y versiones anteriores permite a atacantes remotos llevar a cabo ataques de secuestro de clic a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2016-1177",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-05T18:59:00.117",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://service.falconsc.com/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://service.falconsc.com/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-3909

Vulnerability from fkie_nvd - Published: 2014-09-05 17:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEF11FB-1E67-474B-8175-08FFE03EB331",
              "versionEndIncluding": "4.1.19.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED1F1DBD-5C45-4A7D-9D7D-04E43AC03F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E83F890-506D-4F68-85B6-C30CD594D685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CB895F8-F0CC-49B6-95E0-987BE0613F7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4027A9A4-DEAD-417B-B6A6-37965C7337F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D4FD5F-C0C8-4886-ADCC-9B37C4E69782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B60EA8E-6814-419A-BB2C-AA9F5A6141F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "835A4FC6-2F25-4EFB-A12C-E602EA304498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AD457B7-2ABE-42FF-A2ED-A87D6581C2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205CBC9-5300-4AB9-B4B7-F62F4CA226A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:3.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "61BF9D10-D288-4C26-B24B-125AE7F327B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9513BC-B42B-422C-B609-6F5D89AAF665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3283044B-3FF7-4541-9DA0-6BE89DF1A5E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "709A1640-0E32-4890-BEC6-17EBF261EC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "56090D7D-96B7-4B60-8C1D-787A312461E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDD5689-D393-4A21-AA1A-A72215910BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF9D0F4-D41E-4AF9-8B42-82CE7F0AA490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "94DAA5B9-39D2-4185-A784-1DA082114F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA962554-7893-4E6B-867D-155D43A420EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C64001E5-97B6-4545-8701-92A84BBFB507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:falconsc:wisepoint:4.1.19.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D21321-77CC-49EA-A547-39976501076D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en Falcon WisePoint 4.1.19.7 y anteriores permite a atacantes remotos secuestrar las sesiones web a trav\u00e9s de vectores no especificados."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/384.html\" target=\"_blank\"\u003eCWE-384: Session Fixation\u003c/a\u003e",
  "id": "CVE-2014-3909",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-09-05T17:55:06.797",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch"
      ],
      "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch"
      ],
      "url": "https://service.falconsc.com/service/product/patch/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://service.falconsc.com/service/product/patch/index.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2016-1177 (GCVE-0-2016-1177)

Vulnerability from cvelistv5 – Published: 2016-04-05 01:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN28480773/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037 third-party-advisoryx_refsource_JVNDB
https://service.falconsc.com/ x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#28480773",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
          },
          {
            "name": "JVNDB-2016-000037",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://service.falconsc.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-05T00:57:02",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#28480773",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
        },
        {
          "name": "JVNDB-2016-000037",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://service.falconsc.com/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#28480773",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
            },
            {
              "name": "JVNDB-2016-000037",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
            },
            {
              "name": "https://service.falconsc.com/",
              "refsource": "CONFIRM",
              "url": "https://service.falconsc.com/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1177",
    "datePublished": "2016-04-05T01:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3909 (GCVE-0-2014-3909)

Vulnerability from cvelistv5 – Published: 2014-09-05 17:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN49672671/index.html third-party-advisoryx_refsource_JVN
https://service.falconsc.com/service/product/patc… x_refsource_MISC
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#49672671",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://service.falconsc.com/service/product/patch/index.html"
          },
          {
            "name": "JVNDB-2014-000084",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-09-05T17:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#49672671",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://service.falconsc.com/service/product/patch/index.html"
        },
        {
          "name": "JVNDB-2014-000084",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3909",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#49672671",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
            },
            {
              "name": "https://service.falconsc.com/service/product/patch/index.html",
              "refsource": "MISC",
              "url": "https://service.falconsc.com/service/product/patch/index.html"
            },
            {
              "name": "JVNDB-2014-000084",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3909",
    "datePublished": "2014-09-05T17:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:18.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1177 (GCVE-0-2016-1177)

Vulnerability from nvd – Published: 2016-04-05 01:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN28480773/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037 third-party-advisoryx_refsource_JVNDB
https://service.falconsc.com/ x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#28480773",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
          },
          {
            "name": "JVNDB-2016-000037",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://service.falconsc.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-05T00:57:02",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#28480773",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
        },
        {
          "name": "JVNDB-2016-000037",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://service.falconsc.com/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management screen in Falcon WisePoint 4.3.1 and earlier and WisePoint Authenticator 4.1.19.22 and earlier allows remote attackers to conduct clickjacking attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#28480773",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN28480773/index.html"
            },
            {
              "name": "JVNDB-2016-000037",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000037"
            },
            {
              "name": "https://service.falconsc.com/",
              "refsource": "CONFIRM",
              "url": "https://service.falconsc.com/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1177",
    "datePublished": "2016-04-05T01:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3909 (GCVE-0-2014-3909)

Vulnerability from nvd – Published: 2014-09-05 17:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN49672671/index.html third-party-advisoryx_refsource_JVN
https://service.falconsc.com/service/product/patc… x_refsource_MISC
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#49672671",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://service.falconsc.com/service/product/patch/index.html"
          },
          {
            "name": "JVNDB-2014-000084",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-09-05T17:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#49672671",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://service.falconsc.com/service/product/patch/index.html"
        },
        {
          "name": "JVNDB-2014-000084",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3909",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#49672671",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN49672671/index.html"
            },
            {
              "name": "https://service.falconsc.com/service/product/patch/index.html",
              "refsource": "MISC",
              "url": "https://service.falconsc.com/service/product/patch/index.html"
            },
            {
              "name": "JVNDB-2014-000084",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3909",
    "datePublished": "2014-09-05T17:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:18.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}