Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dell:hybrid_client:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BCAD62B6-DFAB-4237-BE55-A6D8F122C0F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:hybrid_client:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C22DFA4C-B3CD-4867-957A-C6495756AB5D", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:hybrid_client:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4C2A6-8FB0-4FF9-A41E-52A3D5885256", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:hybrid_client:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "659C5C73-A8FC-4642-A16D-F34E82532166", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Dell Hybrid Client prior to version 1.8 contains a Regular Expression Denial of Service Vulnerability in the UI. An adversary with WMS group admin access could potentially exploit this vulnerability, leading to temporary denial-of-service."}, {"lang": "es", "value": "Dell Hybrid Client versiones anteriores a 1.8, contiene una vulnerabilidad de Denegaci\u00f3n de Servicio por Expresi\u00f3n Regular en la Interfaz de Usuario. Un adversario con acceso de administrador del grupo WMS podr\u00eda explotar esta vulnerabilidad, lo que conllevar\u00eda una denegaci\u00f3n de servicio temporal"}], "id": "CVE-2022-34428", "lastModified": "2024-11-21T07:09:32.603", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1"}, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "security_alert@emc.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-09-30T20:15:09.440", "references": [{"source": "security_alert@emc.com", "tags": ["Vendor Advisory"], "url": "https://www.dell.com/support/kbdoc/en-us/000203345/dsa-2022-260-dell-hybrid-client-security-update-for-multiple-vulnerabilities"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.dell.com/support/kbdoc/en-us/000203345/dsa-2022-260-dell-hybrid-client-security-update-for-multiple-vulnerabilities"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-1333"}], "source": "security_alert@emc.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-1333"}], "source": "nvd@nist.gov", "type": "Primary"}]}