{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:06:36.975","vulnerabilities":[{"cve":{"id":"CVE-2012-0430","sourceIdentifier":"cve@mitre.org","published":"2012-12-25T12:13:04.160","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in NetIQ eDirectory 8.8.6.x before 8.8.6.7 and 8.8.7.x before 8.8.7.2 on Windows allows remote attackers to obtain an administrator cookie and bypass authorization checks via unknown vectors."},{"lang":"es","value":"Una vulnerabilidad no especificada en NetIQ eDirectory v8.8.6.x antes de v8.8.6.7 y v8.8.7.x antes de v8.8.7.2 en Windows permite a atacantes remotos obtener una cookie de administrador y omitir las comprobaciones de autorización a través de vectores desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.0:-:*:*:*:windows:*:*","matchCriteriaId":"D3D3D42E-DDAB-44F0-85A4-A3953CB0EF1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.1:-:*:*:*:windows:*:*","matchCriteriaId":"21A19AA6-90CB-4867-8F40-20F45A38310E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.2:-:*:*:*:windows:*:*","matchCriteriaId":"2CC85421-00FF-4359-9543-BB11D099AC9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.3:-:*:*:*:windows:*:*","matchCriteriaId":"125E1837-0475-43DD-B3E8-42090CE7F2B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.4:-:*:*:*:windows:*:*","matchCriteriaId":"46D6A35B-5324-48D6-AEF4-436E0D6CD3BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.5:-:*:*:*:windows:*:*","matchCriteriaId":"33AAFD38-E68F-4A26-8469-6A9AA8C927F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.6.6:-:*:*:*:windows:*:*","matchCriteriaId":"9D005DC1-31D2-43B2-9B72-0FD9C42C0215"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.7.0:-:*:*:*:windows:*:*","matchCriteriaId":"FE700759-5AFC-4584-9DBD-83D41BEDC85A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:edirectory:8.8.7.1:-:*:*:*:windows:*:*","matchCriteriaId":"EAE7E3C6-08E8-45D7-8F3F-2173C3A1D1B5"}]}]}],"references":[{"url":"http://www.novell.com/support/kb/doc.php?id=3426981","source":"cve@mitre.org"},{"url":"http://www.novell.com/support/kb/doc.php?id=7011538","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1027910","source":"cve@mitre.org"},{"url":"https://bugzilla.novell.com/show_bug.cgi?id=772898","source":"cve@mitre.org"},{"url":"http://www.novell.com/support/kb/doc.php?id=3426981","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/support/kb/doc.php?id=7011538","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1027910","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.novell.com/show_bug.cgi?id=772898","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}