mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
162 lines
5.4 KiB
JSON
162 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2012-5205",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2013-03-09T11:55:01.397",
|
|
"lastModified": "2019-10-09T23:06:02.357",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1650."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en HP Intelligent Management Center (iMC) y Intelligent Management Center para Automated Network Manager (ANM) anterior a v5.2 E0401, permitiendo a atacantes remotos obtener informaci\u00f3n sensible, modificar datos o causar una denegaci\u00f3n de servicio mediante vectores desconocidos, tambi\u00e9n conocida como ZDI-CAN-1650."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center_for_automated_network_manager:*:e0202:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.1",
|
|
"matchCriteriaId": "53797C95-D74A-41A2-947F-93AE68B1C9EB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:*:e0202:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.1",
|
|
"matchCriteriaId": "7D16BC7F-A6EC-45AE-B257-869F91B0031D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A78300D-0507-4826-9BFE-0CF3C470626E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E3BD46C-CD5A-4DD3-A0B2-1B445F719698"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h03:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02081D9F-44B2-4F39-B1EB-0282701FDD4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101h04:*:*:*:*:*:*",
|
|
"matchCriteriaId": "491C786C-A73F-4D5C-83E8-A471EA442A4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D97F1E65-6A0C-491E-8EBC-643F38F1B0C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l02:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1C229E5-9778-4D00-A9F3-877E30013BD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54095ACB-BF41-4283-BAA8-058A2A8E6EB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:5.1:e0101p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F70D86F-E6B6-4314-9349-6BE421FF6100"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:*:e0202:enterprise:*:*:*:*:*",
|
|
"versionEndIncluding": "5.1",
|
|
"matchCriteriaId": "55687EAA-0EAB-4FD7-97F4-91F2F348E4DC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136268852804156&w=2",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03689276",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |