{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:03:56.276","vulnerabilities":[{"cve":{"id":"CVE-2020-28405","sourceIdentifier":"cve@mitre.org","published":"2021-01-29T07:15:16.547","lastModified":"2025-05-30T16:15:26.400","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An improper authorization vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an unauthorized user to change the privileges of any user of the application. This can be used to grant himself the administrative role or remove all administrative accounts of the application."},{"lang":"es","value":"Se presenta una vulnerabilidad de autorización inapropiada en Star Practice Management Web versión 2019.2.0.6, que permite a un usuario no autorizado cambiar los privilegios de cualquier usuario de la aplicación.&#xa0;Esto puede ser usado para otorgarse a sí mismo el rol administrativo o eliminar todas las cuentas administrativas de la aplicación"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iris:star_practice_management:2019.2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"9DC8504E-FAE3-4332-9AD6-F5675749AA69"}]}]}],"references":[{"url":"https://cds.thalesgroup.com/en/tcs-cert/CVE-2020-28405","source":"cve@mitre.org"},{"url":"https://excellium-services.com/cert-xlm-advisory/CVE-2020-28405","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.starpracticemanagement.com/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://excellium-services.com/cert-xlm-advisory/CVE-2020-28405","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.starpracticemanagement.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}