Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:novell:open_enterprise_server_11:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D2E9D90-409F-422E-8CE7-1C543EEEEDBF", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:open_enterprise_server_11:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "8B194D36-14D4-40DC-B07D-59F9DB96EEBF", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:open_enterprise_server_2015:*:*:*:*:*:*:*:*", "matchCriteriaId": "E56590D0-3D82-4822-BF3B-69BBFCAF7960", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:open_enterprise_server_2015:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "264D85F8-3B9F-4DD8-91D3-DB0771956D51", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Vulnerability in Novell Open Enterprise Server (OES2015 SP1 before Scheduled Maintenance Update 10992, OES2015 before Scheduled Maintenance Update 10990, OES11 SP3 before Scheduled Maintenance Update 10991, OES11 SP2 before Scheduled Maintenance Update 10989) might allow authenticated remote attackers to perform unauthorized file access and modification."}, {"lang": "es", "value": "Vulnerabilidad en Novell Open Enterprise Server (OES2015 SP1 en versiones anteriores a Scheduled Maintenance Update 10992, OES2015 en versiones anteriores a Scheduled Maintenance Update 10990, OES11 SP3 en versiones anteriores a Scheduled Maintenance Update 10991, OES11 SP2 en versiones anteriores a Scheduled Maintenance Update 10989) podr\u00eda permitir a atacantes remotos autenticados llevar a cabo un acceso y modificaci\u00f3n no autorizado de archivos."}], "id": "CVE-2016-5763", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-11-15T19:30:01.797", "references": [{"source": "security@opentext.com", "url": "http://download.novell.com/Download?buildid=3Ho1yp5JOXA~"}, {"source": "security@opentext.com", "url": "http://download.novell.com/Download?buildid=Fj0Hdns7mxA~"}, {"source": "security@opentext.com", "url": "http://download.novell.com/Download?buildid=dfqmrymc0Rg~"}, {"source": "security@opentext.com", "url": "http://download.novell.com/Download?buildid=s9_RxhgC8KU~"}, {"source": "security@opentext.com", "url": "http://www.securityfocus.com/bid/94348"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=3Ho1yp5JOXA~"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=Fj0Hdns7mxA~"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=dfqmrymc0Rg~"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=s9_RxhgC8KU~"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/94348"}], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-254"}], "source": "nvd@nist.gov", "type": "Primary"}]}