mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
116 lines
3.7 KiB
JSON
116 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2011-2299",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2011-07-21T00:55:02.223",
|
|
"lastModified": "2011-10-05T02:54:56.863",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Oracle SPARC Enterprise M3000, M4000, M5000, M8000, and M9000 XCP 1101 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to XSCF Control Package (XCP)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en Oracle SPARC Enterprise M3000, M4000, M5000, M8000, M9000 y XCP 1101 y anteriores permite a atacantes remotos afectar a la confidencialidad, integridad y disponibilidad, en relaci\u00f3n con el paquete de control de XSCF (XCP)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:xcp:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1100",
|
|
"matchCriteriaId": "885CFFC2-ABF5-47F1-BE4D-28B6B8692536"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:oracle:sparc_enterprise_m3000_server:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE985481-02B0-4813-9390-33BDD24257A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:oracle:sparc_enterprise_m4000_server:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4449463C-0681-42F7-887B-719E3FA06DE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:oracle:sparc_enterprise_m5000_server:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F96C3AEE-6D8F-445B-8F20-B02C93560C4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:oracle:sparc_enterprise_m8000_server:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F528DC3-ADBB-4612-A8C0-A4B806E5BB44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:oracle:sparc_enterprise_m9000_server:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0050034-1E95-4724-B359-87C56D0198C4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
}
|
|
]
|
|
} |