CVE-2014-1930 (GCVE-0-2014-1930)
Vulnerability from cvelistv5 – Published: 2014-02-10 22:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
Visibility Software Cyber Recruiter before 8.1.00 does not use the appropriate combination of HTTPS transport and response headers to prevent access to (1) AppSelfService.aspx and (2) AgencyPortal.aspx in the browser history, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2014-01-27 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:15.519Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#566894",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/566894"
},
{
"name": "102814",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102814"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/vu/JVNVU97441356/index.html"
},
{
"name": "65305",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65305"
},
{
"name": "102815",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102815"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Visibility Software Cyber Recruiter before 8.1.00 does not use the appropriate combination of HTTPS transport and response headers to prevent access to (1) AppSelfService.aspx and (2) AgencyPortal.aspx in the browser history, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-02-18T17:57:02.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#566894",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/566894"
},
{
"name": "102814",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102814"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/vu/JVNVU97441356/index.html"
},
{
"name": "65305",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65305"
},
{
"name": "102815",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102815"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-1930",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Visibility Software Cyber Recruiter before 8.1.00 does not use the appropriate combination of HTTPS transport and response headers to prevent access to (1) AppSelfService.aspx and (2) AgencyPortal.aspx in the browser history, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#566894",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/566894"
},
{
"name": "102814",
"refsource": "OSVDB",
"url": "http://osvdb.org/102814"
},
{
"name": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details",
"refsource": "CONFIRM",
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
},
{
"name": "http://jvn.jp/vu/JVNVU97441356/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/vu/JVNVU97441356/index.html"
},
{
"name": "65305",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65305"
},
{
"name": "102815",
"refsource": "OSVDB",
"url": "http://osvdb.org/102815"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-1930",
"datePublished": "2014-02-10T22:00:00.000Z",
"dateReserved": "2014-02-10T00:00:00.000Z",
"dateUpdated": "2024-08-06T09:58:15.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2014-1930",
"date": "2026-04-24",
"epss": "0.00825",
"percentile": "0.74526"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.0\", \"matchCriteriaId\": \"8E219E01-59F5-4AF7-AEE1-48E1F57CC216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"999F78ED-5A81-4CD3-BE92-EAD36781FFFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D000435-C3E3-4511-8E94-74CD6A24826C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACA334AA-0064-4967-B4F2-3678E59813E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACD7E9E4-E187-4FC7-92B9-8C152B323F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F875BF2-6BA6-43AD-8F46-EE4B9911F9BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:visibility_software:cyber_recruiter:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D406D9A-ACE3-4FFA-9B33-AB056222BDFB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Visibility Software Cyber Recruiter before 8.1.00 does not use the appropriate combination of HTTPS transport and response headers to prevent access to (1) AppSelfService.aspx and (2) AgencyPortal.aspx in the browser history, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation.\"}, {\"lang\": \"es\", \"value\": \"Visibility Software Cyber Recruiter anterior a 8.1.00 no maneja adecuadamente la combinaci\\u00f3n de cabezeras de transporte y respuesta HTTPS para prevenir el acceso a (1) AppSelfService.aspx y (2) AgencyPortal.aspx en el historial del navegador, lo que permite a atacantes remotos obtener informaci\\u00f3n sensible mediante el aprovechamiento de una estaci\\u00f3n de trabajo sin supervisi\\u00f3n.\"}]",
"id": "CVE-2014-1930",
"lastModified": "2024-11-21T02:05:17.780",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-02-10T22:55:03.887",
"references": "[{\"url\": \"http://jvn.jp/vu/JVNVU97441356/index.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/102814\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/102815\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/566894\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/65305\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jvn.jp/vu/JVNVU97441356/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/102814\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/102815\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/566894\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/65305\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-1930\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-02-10T22:55:03.887\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Visibility Software Cyber Recruiter before 8.1.00 does not use the appropriate combination of HTTPS transport and response headers to prevent access to (1) AppSelfService.aspx and (2) AgencyPortal.aspx in the browser history, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation.\"},{\"lang\":\"es\",\"value\":\"Visibility Software Cyber Recruiter anterior a 8.1.00 no maneja adecuadamente la combinaci\u00f3n de cabezeras de transporte y respuesta HTTPS para prevenir el acceso a (1) AppSelfService.aspx y (2) AgencyPortal.aspx en el historial del navegador, lo que permite a atacantes remotos obtener informaci\u00f3n sensible mediante el aprovechamiento de una estaci\u00f3n de trabajo sin supervisi\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0\",\"matchCriteriaId\":\"8E219E01-59F5-4AF7-AEE1-48E1F57CC216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"999F78ED-5A81-4CD3-BE92-EAD36781FFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D000435-C3E3-4511-8E94-74CD6A24826C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACA334AA-0064-4967-B4F2-3678E59813E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACD7E9E4-E187-4FC7-92B9-8C152B323F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F875BF2-6BA6-43AD-8F46-EE4B9911F9BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:visibility_software:cyber_recruiter:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D406D9A-ACE3-4FFA-9B33-AB056222BDFB\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/vu/JVNVU97441356/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/102814\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/102815\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/566894\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/65305\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/vu/JVNVU97441356/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/102814\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/102815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/566894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/65305\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…