mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
131 lines
4.4 KiB
JSON
131 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2007-2502",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-05-04T01:19:00.000",
|
|
"lastModified": "2017-07-29T01:31:30.707",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "The vendor has addressed this issue with the following product update:\r\nhttp://www.hp.com/rnd/software/switches.htm",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en los conmutadores HP ProCurve 9300m Series con software 8.0.01c hasta 08.0.01j permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante vectores desconocidos, una versi\u00f3n diferente de familias de conmutadores de CVE-2006-4015."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "610CFDE5-50C7-4E30-BB01-46F8798F173B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD9340AF-B19F-456F-8DE6-E634E87C3D0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C611DAB-4761-4C6E-B8F9-1A6B58E46165"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BDFC288-0F73-488A-8C52-550ADD9383EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01g:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8795E129-F7A5-4389-9AAF-18784CDBB4CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01h:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89D36807-8283-48C8-B55A-B088B0F5135A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01i:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "457C7E52-DFC8-4BA0-89DD-FF8BFA6005E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:procurve_switch_9300m:08.0.01j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CAB4C0D-4E81-469D-BB8A-2BDD41564DFE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01034753",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23791",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1018001",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1651",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34033",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |