Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:iportalis:iportalis_control_portal:7.1.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "D53BC106-475D-40B1-AB34-0A29CA1EF69E", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in iPortalis iCS 7.1.13.0. Attackers can send a sequence of requests to rapidly cause .NET Input Validation errors. This increases the size of the log file on the remote server until memory is exhausted, therefore consuming the maximum amount of resources (triggering a denial of service condition)."}, {"lang": "es", "value": "Se ha detectado un problema en iPortalis iCS versi\u00f3n 7.1.13.0. Unos atacantes pueden enviar una secuencia de peticiones para causar r\u00e1pidamente errores de comprobaci\u00f3n de entrada de .NET. Esto aumenta el tama\u00f1o del archivo de registro en el servidor remoto hasta que es agotada la memoria, consumiendo as\u00ed la m\u00e1xima cantidad de recursos (desencadenando una condici\u00f3n de denegaci\u00f3n de servicio)"}], "id": "CVE-2020-9000", "lastModified": "2024-11-21T05:39:48.437", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-09-01T11:15:07.710", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://websec.nl/blog/"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://websec.nl/blog/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-400"}], "source": "nvd@nist.gov", "type": "Primary"}]}