Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html", "name": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.exploit-db.com/exploits/37114", "name": "37114", "tags": ["Exploit"], "refsource": "EXPLOIT-DB"}, {"url": "http://www.sendio.com/software-release-history/", "name": "http://www.sendio.com/software-release-history/", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://seclists.org/fulldisclosure/2015/May/95", "name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability", "tags": ["Exploit"], "refsource": "FULLDISC"}, {"url": "http://www.securityfocus.com/archive/1/535592/100/0/threaded", "name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-200"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2014-0999", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2015-06-02T14:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:sendio:sendio:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "7.2.3"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-09T19:42Z"}