mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
124 lines
3.9 KiB
JSON
124 lines
3.9 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2006-2512",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2006-05-22T21:06:00.000",
|
||
|
"lastModified": "2017-07-20T01:31:32.867",
|
||
|
"vulnStatus": "Modified",
|
||
|
"evaluatorSolution": "This vulnerability is addressed in the following product releases:\r\nHitachi, EUR Viewer, 05-06-/A\r\nHitachi, EUR Professional, 05-06-/A\r\nHitachi, EUR Print Service, 05-06-/A",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "SQL injection vulnerability in Hitachi EUR Professional Edition, EUR Viewer, EUR Print Service, and EUR Print Service for ILF allows remote authenticated users to execute arbitrary SQL commands via unknown attack vectors."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "SINGLE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 6.5
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.0,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": true,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_print_service:05_01:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "26BC0C9B-4027-4B3F-9803-B48CCDFA9F92"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_print_service:05_06:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DB2AC433-5157-4E2A-B2AC-F6DD4790CBB4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_print_service_for_ilf:05_06:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "75237193-C175-4E50-B107-B67555E095B1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_professional:05_00:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A24125B6-F7A1-4FC6-9256-A2A038A9B4E6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_professional:05_06:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6C08CA82-EF9F-405B-954D-1F7A0A2C41E8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_viewer:05_00:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "70C2EA6B-7A92-45DF-A478-C4115FACC9A0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hitachi:eur_viewer:05_06:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CA1C32D7-EF15-488D-87EE-40EEF9816A2E"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-010_e/index-e.html",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/18015",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2006/1841",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26483",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|