Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BC6A8AB-F3C6-4A64-8637-E40FFE878B5E", "versionEndExcluding": "6.1.15.39", "versionStartIncluding": "6.1.15", "vulnerable": true}, {"criteria": "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F9C05B-0DC3-4F41-81B1-F50C3453E9FE", "versionEndExcluding": "7.1.5.15", "versionStartIncluding": "7.1.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F7BBA25-C041-45B9-9901-2D9D9D3C5F44", "versionEndExcluding": "7.1.15.7", "versionStartIncluding": "7.1.15", "vulnerable": true}, {"criteria": "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D26EC45-C91A-48D9-9281-B377F2419326", "versionEndExcluding": "7.5.5.9", "versionStartIncluding": "7.5.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AAC71CC-470E-43D0-8F08-8E24CDC684C7", "versionEndExcluding": "8.1.7.3", "versionStartIncluding": "8.1.7", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the User Management module in McAfee Network Security Manager (NSM) before 6.1.15.39 7.1.5.x before 7.1.5.15, 7.1.15.x before 7.1.15.7, 7.5.x before 7.5.5.9, and 8.x before 8.1.7.3 allows remote attackers to hijack the authentication of users for requests that modify user accounts via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de CSRF en el m\u00f3dulo User Management en McAfee Network Security Manager (NSM) anterior a 6.1.15.39 7.1.5.x anterior a 7.1.5.15, 7.1.15.x anterior a 7.1.15.7, 7.5.x anterior a 7.5.5.9, y 8.x anterior a 8.1.7.3 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios para solicitudes que modifican las cuentas de los usuarios a trav\u00e9s de vectores no especificados."}], "evaluatorComment": "Per: https://kc.mcafee.com/corporate/index?page=content&id=SB10081\n\n\"Affected Versions:\n\n 8.1.7.2 and earlier\n 7.5.5.8 and earlier\n 7.1.15.6 and earlier\n 7.1.5.14 and earlier\n 6.1.15.38 and earlier\"", "id": "CVE-2014-2390", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-08-29T16:55:10.060", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1030674"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10081"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1030674"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10081"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}