mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
355 lines
13 KiB
JSON
355 lines
13 KiB
JSON
{
|
|
"id": "CVE-2007-6194",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-12-06T02:46:00.000",
|
|
"lastModified": "2024-11-21T00:39:34.667",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in HP Select Identity 4.01 before 4.01.012 and 4.1x before 4.13.003 allows remote attackers to obtain unspecified access via unknown vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en HP Select Identity 4.01 anterior a 4.01.012 y 4.1x anterior a 4.13.003 permite a atacantes remotos obtener acceso no especificado mediante vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 10.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.01:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "379151EB-7D31-461F-BB9E-4808A76CB97B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.01:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "C2CB2EAD-C6FF-473E-A908-B87CE1539606"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.01:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "01AE2C3F-B2FF-427C-9FFF-0BF5EE9D3113"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.01:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "19FA843F-B60D-4DB9-AC3E-37F279EF8CC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "9DCB17CC-2186-4023-AD2A-5EEEF0B3D89F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "F51843D3-20BC-4A95-8A92-66086CDF0D66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "72571E5E-1FD0-4582-BC36-F063C70957BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "23E7255C-2A9C-4FB9-9A65-906E2E181AD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "60B21768-0CAC-4733-941E-C7EFB72043CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "8C441652-0252-48CC-9EF1-21C3C5FAC053"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "6AA14E20-1B7F-421A-8A45-A9F7E4A22F53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "75947839-146C-4F3F-80B3-85B043798F31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "96DD208B-3AFF-401A-A3F0-BA18B3945B61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "3327ECFE-F0B3-44D8-9A64-0E9E3DB1B7B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "BD6F7563-FDF8-4D5F-8C85-9BE8BDABC802"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "27531CFA-0F91-4CF5-914B-7616C05FB991"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "9C0D1440-EAC1-41A4-9026-C4AB98305061"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "9CE46849-BE74-48A0-813E-174515D7F164"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "45C77ED4-99A0-422E-87F9-CCA7ED251D00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "CE4A8658-938F-40FC-A58B-10F6236FAFB0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "F2D1D632-93FA-4BBC-983F-070EA295BBA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "D35C6D9B-5B57-42D2-97B3-85D1DAE73178"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "E0C0EF6E-7F19-4CF9-8C8C-76671DFCFF30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "8AF42B2C-F7F8-44EE-B136-2A669E892FCB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "4376106F-89A4-4A15-8CE1-F80F2B702080"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "37E31C70-E435-4403-AEC1-FC8F8EA44783"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "CCFA8553-5F2F-40DA-9268-43596BC5FDAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "0E74612D-EE1D-4EC8-A153-80F92CF2EDB6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "4B300809-100E-49B9-953D-F041B0F4D259"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "11F78709-168C-49FA-A03F-33C6233B7081"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "4A73EC56-21A8-43E2-8800-B7D8E4B0E76C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "6E8280B2-861A-460E-8629-AB0FFB6F3085"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "E295575E-C654-4504-84A7-C72E956800A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "958DBA3C-DBF3-4639-86A8-DA66ACC3413B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "E7BA4AFD-7DE5-462F-906E-1744C9CD23CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "899A20CC-4D15-437C-BFFA-49C7713BC066"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "8CA68689-FB24-4B7D-983F-722F39A3B545"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "8024B405-60EB-4C16-84A8-5F607BA824C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "70D95786-77B3-49DC-B15F-631A1174E64B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "4C3F0387-AA8D-4E55-8FC9-301D642A6F95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:red_hat_linux_as3:*:*:*:*:*",
|
|
"matchCriteriaId": "F60FA31F-3224-4118-9E04-0DCC547FF986"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "7E27357F-0AAF-4482-A885-54E451005AF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:windows_2003:*:*:*:*:*",
|
|
"matchCriteriaId": "7D5E484F-F7E3-4154-A28E-251786CA0892"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/40143",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/27924",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26694",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1019037",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/4093",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38840",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/40143",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/27924",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26694",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1019037",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/4093",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38840",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |