{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T04:10:16.412","vulnerabilities":[{"cve":{"id":"CVE-2020-28406","sourceIdentifier":"cve@mitre.org","published":"2021-01-29T07:15:16.623","lastModified":"2025-05-30T16:15:26.530","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An improper authorization vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an unauthorized user to access details about jobs he should not have access to via the Audit Trail Feature."},{"lang":"es","value":"Se presenta una vulnerabilidad de autorización inapropiada en Star Practice Management Web versión 2019.2.0.6, permitiendo a un usuario no autorizado acceder a detalles acerca de trabajos a los que no debería tener acceso por medio de la Funcionalidad Audit Trail"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iris:star_practice_management:2019.2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"9DC8504E-FAE3-4332-9AD6-F5675749AA69"}]}]}],"references":[{"url":"https://cds.thalesgroup.com/en/tcs-cert/CVE-2020-28406","source":"cve@mitre.org"},{"url":"https://excellium-services.com/cert-xlm-advisory/CVE-2020-28406","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.starpracticemanagement.com/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://excellium-services.com/cert-xlm-advisory/CVE-2020-28406","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.starpracticemanagement.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}