{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125060","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-07T12:44:23.196Z","datePublished":"2023-01-07T12:44:59.019Z","dateUpdated":"2024-08-06T14:10:56.612Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T06:27:39.390Z"},"title":"holdennb CollabCal calenderServer.cpp handleGet improper authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-287","lang":"en","description":"CWE-287 Improper Authentication"}]}],"affected":[{"vendor":"holdennb","product":"CollabCal","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in holdennb CollabCal. Affected is the function handleGet of the file calenderServer.cpp. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The patch is identified as b80f6d1893607c99e5113967592417d0fe310ce6. It is recommended to apply a patch to fix this issue. VDB-217614 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in holdennb CollabCal gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion handleGet der Datei calenderServer.cpp. Dank Manipulation mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Patch wird als b80f6d1893607c99e5113967592417d0fe310ce6 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-29T20:52:21.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217614","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217614","tags":["signature","permissions-required"]},{"url":"https://github.com/holdennb/CollabCal/commit/b80f6d1893607c99e5113967592417d0fe310ce6","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.612Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217614","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217614","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/holdennb/CollabCal/commit/b80f6d1893607c99e5113967592417d0fe310ce6","tags":["patch","x_transferred"]}]}]}}