{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T13:46:44.213","vulnerabilities":[{"cve":{"id":"CVE-2021-31831","sourceIdentifier":"trellixpsirt@trellix.com","published":"2021-06-03T10:15:07.437","lastModified":"2024-11-21T06:06:18.910","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect access to deleted scripts vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to gain access to signed SQL scripts which have been marked as deleted or expired within the administrative console. This access was only available through the REST API."},{"lang":"es","value":"Una vulnerabilidad de acceso incorrecto a scripts eliminados en McAfee Database Security (DBSec) versiones anteriores a 4.8.2, permite a un atacante remoto autenticado conseguir acceso a scripts SQL firmados que han sido marcados como eliminados o caducados dentro de la consola administrativa. Este acceso solo estaba disponible mediante la API REST"}],"metrics":{"cvssMetricV31":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.5,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":3.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"trellixpsirt@trellix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-552"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-552"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:database_security:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.2","matchCriteriaId":"7587EA60-33A0-404E-8357-F057E06EA16B"}]}]}],"references":[{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10359","source":"trellixpsirt@trellix.com","tags":["Broken Link"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10359","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}