mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
265 lines
9.2 KiB
JSON
265 lines
9.2 KiB
JSON
{
|
|
"id": "CVE-2001-0134",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2001-03-12T05:00:00.000",
|
|
"lastModified": "2024-11-20T23:34:40.943",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in cpqlogin.htm in web-enabled agents for various Compaq management software products such as Insight Manager and Management Agents allows remote attackers to execute arbitrary commands via a long user name."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 10.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:armada_insight_manager:4.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63798667-EB89-4623-BF65-A0A2628EC8C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:armada_insight_manager:4.20j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D05E39C-83E7-41E2-AC50-AA4828AC9E0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:enterprise_volume_manager-command_scripter:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A11C13C-CFB2-4581-9BFD-900C0561951C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:enterprise_volume_manager-command_scripter:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "087246B0-FD45-443D-8D4B-84A3A9B641F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:foundation_agents:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91B1A554-4B35-4F7E-9124-0057FC6524E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:foundation_agents:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B841A7C-B8F9-4339-98FF-1F27D0483AA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:foundation_agents:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A9BCAAD-0DC4-42E1-B8AB-4E65674F0CF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:foundation_agents:4.90:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98E1C77A-23CD-440C-9127-563D824D041E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_management_agent:4.37e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11CE4F2C-6586-403A-9B60-6433D983C8E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_management_desktop_web_agent:3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD82EECB-786F-4616-897A-EDE5A9CC8453"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_manager_lc:1.3c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDD3A86B-228E-4934-BAE5-63DC4A466522"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_manager_lc:1.50a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96A1E444-C45A-4B04-A845-125332D1B67D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_manager_xe:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "091FB40A-03CD-4CDF-961D-A6D0AECDE6B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:insight_manager_xe:1.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "803B702A-3D4D-4438-A182-B181BEA00270"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:intelligent_cluster_administrator:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B434EC96-751A-4696-A0C3-B0EA66AE15A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:intelligent_cluster_administrator:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7172182F-D845-4F0A-A662-1DC30B9A6223"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:management_agents:4.30j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E2D8216-85A8-4005-92A1-371EDF1D8EFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:management_agents:4.35j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1639BBC5-FF6F-44B5-BC4E-3730AD9A0D99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:management_agents:4.36e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83D2DD0D-2063-4299-980E-CEA6D11CB9B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:management_agents:4.36j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02E35578-B551-4A7B-84E3-21F948FEEB96"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:open_san_manager:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "120BBD71-A8E9-40D8-88FF-2C0FBC3E8E3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:sanworks_resource_monitor:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "452385FD-BD83-4709-858E-DC79A66B9260"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:storage_allocation_reporter:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21E57135-DE2E-48B5-A30C-46C2B1933CEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:survey_utility:2.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7464B89B-472E-48FF-8B33-BED47D2FCF8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:survey_utility:2.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0498F6A-C80A-44AC-A937-D1EA19C18ABC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:survey_utility:2.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CED3495F-FD78-48D6-ADB6-EF42F9A30E23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:compaq:system_healthcheck:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E033ADB3-60B3-4BD2-8B97-1114787C677C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:digital:unix:4.0f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8237F390-43DB-4B07-9CD7-C3F804710497"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:digital:unix:4.0g:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24E73BB1-2FE1-44B0-AF41-8F26D4E8A428"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:digital:unix:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "703BA12A-E5A9-4152-9914-2840AC09205E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=97967435023835&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/2200",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www5.compaq.com/products/servers/management/agentsecurity.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=97967435023835&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/2200",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www5.compaq.com/products/servers/management/agentsecurity.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |