mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
345 lines
14 KiB
JSON
345 lines
14 KiB
JSON
{
|
|
"id": "CVE-2007-1853",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-04-03T16:19:00.000",
|
|
"lastModified": "2024-11-21T00:29:18.847",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Hitachi JP1/HiCommand DeviceManager, Global Link Availability Manager, Replication Monitor, Tiered Storage Manager, and Tuning Manager allows local users to obtain authentication information via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en el Hitachi JP1/HiCommand DeviceManager, Global Link Availability Manager, Replication Monitor, Tiered Storage Manager y Tuning Manager permite a usuarios locales obtener la informaci\u00f3n de la autenticaci\u00f3n mediante vectores sin especificar."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "082BE494-064A-48E7-8C63-1033D8307376"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66CFD96F-3A15-447D-B52F-CB4D024DF7AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "203C2D9D-90B8-43D4-875E-4362BE652072"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E1C5F96-DD46-4D87-B60A-994D1004D43A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43A37DF9-044B-48BF-AB67-25B47A7C8B29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C927356-D6AE-4042-A82C-1815DE113748"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_05:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D8AB9EB-62CF-47E3-96F2-6A878AAF8C96"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F30CDA4-1EDF-4271-988C-2A4364BE3317"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50_01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71C825A7-BD7D-4BAB-BCA4-6CDE64EEC0EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50_02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F83178C7-58E7-4425-A995-9036DF6409DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBFF5989-75DD-4538-84E2-88BE0B8B7607"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75E70110-718D-4D1A-852D-D1B0BFEA4E04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE64D18C-A55A-4872-8984-B590341029EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49B9796E-B0BF-4043-A9C1-612B680BDDD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CD4EB51-7571-4080-A402-22792D832CAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B20880A3-1903-4EA3-A9C4-B94F6CFFF5D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD6EE5E1-E0F0-49F4-8E41-EB282813C228"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E24DA4D-4413-4ACD-A04A-F31E62DE6F22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:04_00:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "907A0E2B-FC9D-4D2B-93B6-907702F20C12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_00:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "BA0D6A62-AFF7-4366-8305-8E7B96F64A38"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD9A1108-965D-4C37-A426-01DAABDBD42D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61B6418B-D016-4FA3-9A6F-832F46241F40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB22B0B9-F66D-4ACB-9334-E97C2EEA11C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDFC8995-669F-4453-B38A-DB66F85595F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "F9CD01AA-1EAA-4EBB-A8A7-949DD1E00B65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50_01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A289BBCA-F14A-4CCC-B89B-BB50FD142261"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50_02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11F4B284-B3C3-4BDD-9A00-F0A1B503492E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E06BF10-2A5A-431D-A0AB-07276961C74E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:04_00:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "FDC1DB73-7C90-4278-8226-FB0FA9C36011"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_00:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "5F0C1855-BFF1-43A7-8F9A-7177E544D389"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2F65701-76C9-4F30-961B-5784DF5976A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FF26678-8214-43D3-A489-F3E3EA55CC80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39C52083-7DD6-421A-8E15-19586DD6771F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47FD52B2-8EE3-42FE-8A4B-CB8BC1411C8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "AA150DEE-1A32-4510-A205-BC6F729A6FA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50_01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1422A330-9488-4774-85C9-6DBD5DB748A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50_02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16FB119D-A909-4A6C-8D1A-E52DC9E5E30D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:04_00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84A9B9AF-6955-49D2-BD8E-5D731777B332"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D17FB3F-2EE9-411B-922A-1B9AB683F021"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "063D2B7D-B809-4C66-B51F-DBC9064FAC4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25BF7E13-2CC5-4B7D-9D53-BA166B86B6EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B9C266C-1A1B-4F0F-8418-BD9EE8249051"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08B03D95-1225-49CE-A66B-FF9C386106DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2F54E96-35D7-4083-B96B-46156FC937CE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/34590",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24684",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-007_e/index-e.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23210",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1169",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33328",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/34590",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24684",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-007_e/index-e.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23210",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1169",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33328",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |