{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:07:20.685","vulnerabilities":[{"cve":{"id":"CVE-2019-16133","sourceIdentifier":"cve@mitre.org","published":"2019-09-09T03:15:10.577","lastModified":"2024-11-21T04:30:07.167","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in eteams OA v4.0.34. Because the session is not strictly checked, the account names and passwords of all employees in the company can be obtained by an ordinary account. Specifically, the attacker sends a jsessionid value for URIs under app/profile/summary/."},{"lang":"es","value":"Se descubrió un problema en eteams OA v4.0.34. Debido a que la sesión no se verifica estrictamente, los nombres de cuenta y las contraseñas de todos los empleados de la empresa pueden obtenerse mediante una cuenta ordinaria. Específicamente, el atacante envía un valor jsessionid para los URI en aplicación / perfil / resumen"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:weaver:eteams_oa:4.0.34:*:*:*:*:*:*:*","matchCriteriaId":"F074453C-7F63-4E36-9DC3-F19ACD43E61D"}]}]}],"references":[{"url":"http://www.iwantacve.cn/index.php/archives/271/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"http://www.iwantacve.cn/index.php/archives/271/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}