Show plain JSON{"id": "CVE-2003-1593", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2010-04-05T15:30:00.703", "references": [{"url": "http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection."}, {"lang": "es", "value": "NWFTPD.nlm en el servidor FTP en Novell NetWare v6.0 anterior a SP4 y v6.5 anterior a SP1 no refuerza las restricciones de login domain-name, lo que permite a atacantes remotos evitar el control de acceso establecido a trav\u00e9s de una conexi\u00f3n FTP."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E"}, {"criteria": "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B04B18E8-A130-4BAA-8BBC-D9DF7085F9F0"}, {"criteria": "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9700BC2-BE56-448F-BAE6-AD01F71DC646"}, {"criteria": "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE91855A-062B-47D7-BC38-5980E3F6F2FE"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}