CVE-2016-1991
Summary
| CVE | CVE-2016-1991 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-03-16 10:59:00 UTC |
| Updated | 2018-10-17 18:44:00 UTC |
| Description | HPE ArcSight ESM 5.x before 5.6, 6.0, 6.5.x before 6.5C SP1 Patch 2, and 6.8c before P1, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to conduct unspecified "file download" attacks via unknown vectors. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.0 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.5 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.8 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.9 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.0 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.5 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.8 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | 6.9 | All | All | All |
| Application | Microfocus | Arcsight Enterprise Security Manager | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Patch, Vendor Advisory |
| HPE ArcSight Enterprise Security Manager Bugs Let Remote Authenticated Users Download Files and Local Users Gain Elevated Privileges - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.