mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
139 lines
4.6 KiB
JSON
139 lines
4.6 KiB
JSON
{
|
|
"id": "CVE-2011-0890",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2011-03-25T18:55:01.450",
|
|
"lastModified": "2017-08-17T01:33:44.587",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "HP Discovery & Dependency Mapping Inventory (DDMI) 7.50, 7.51, 7.60, 7.61, 7.70, and 9.30 launches the Windows SNMP service with its default configuration, which allows remote attackers to obtain potentially sensitive information or have unspecified other impact by leveraging the public read community."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "HP Discovery & Dependency Mapping Inventory (DDMI) v7.50, v7.51, v7.60, v7.61, v7.70 y v9.30 inicia el servicio SNMP de Windows con su configuraci\u00f3n predeterminada, lo que permite a atacantes remotos obtener informaci\u00f3n sensible u otro impacto no especificado mediante el aprovechamiento de la lectura p\u00fablica de la comunidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "044B28F0-C1C5-4BE6-ADA7-28341024A1C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.51:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "146FFF61-C7B7-404C-9697-97AAF1138FAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD17A792-40FD-4032-8552-14464BAF93B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.61:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "839425E6-2DC4-44DE-99FA-8638B0DDC3DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.70:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B180F4F2-6FC6-41AD-8134-80023F692F66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:9.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5031736-4B2D-4861-A3DB-1467F212AB36"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=130082163516878&w=2",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8163",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1025239",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/46981",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0755",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66242",
|
|
"source": "hp-security-alert@hp.com"
|
|
}
|
|
]
|
|
} |