Search criteria
9 vulnerabilities found for JP1/Performance Management by Hitachi, Ltd
JVNDB-2023-003771
Vulnerability from jvndb - Published: 2023-10-04 15:23 - Updated:2023-10-04 15:23
Severity ?
Summary
File and Directory Permissions Vulnerability in JP1/Performance Management
Details
A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html",
"dc:date": "2023-10-04T15:23+09:00",
"dcterms:issued": "2023-10-04T15:23+09:00",
"dcterms:modified": "2023-10-04T15:23+09:00",
"description": "A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management.",
"link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:tuning_manager",
"@product": "Hitachi Tuning Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "8.4",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2023-003771",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-3440",
"@id": "CVE-2023-3440",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-3440",
"@id": "CVE-2023-3440",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
}
],
"title": "File and Directory Permissions Vulnerability in JP1/Performance Management"
}
JVNDB-2020-002278
Vulnerability from jvndb - Published: 2020-03-11 14:16 - Updated:2020-03-11 14:16Summary
Cross-site Scripting Vulnerability in JP1/Performance Management - Manager [Web Console]
Details
A Cross-site Scripting Vulnerability was found in JP1/Performance Management - Manager [Web Console].
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002278.html",
"dc:date": "2020-03-11T14:16+09:00",
"dcterms:issued": "2020-03-11T14:16+09:00",
"dcterms:modified": "2020-03-11T14:16+09:00",
"description": "A Cross-site Scripting Vulnerability was found in JP1/Performance Management - Manager [Web Console].",
"link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002278.html",
"sec:cpe": {
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2020-002278",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Cross-site Scripting Vulnerability in JP1/Performance Management - Manager [Web Console]"
}
JVNDB-2017-006769
Vulnerability from jvndb - Published: 2017-09-04 12:14 - Updated:2017-09-05 10:46
Severity ?
Summary
Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director
Details
A vulnerability to denial-of-service attacks was found in JP1 and Hitachi IT Operations Director.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-006769.html",
"dc:date": "2017-09-05T10:46+09:00",
"dcterms:issued": "2017-09-04T12:14+09:00",
"dcterms:modified": "2017-09-05T10:46+09:00",
"description": "A vulnerability to denial-of-service attacks was found in JP1 and Hitachi IT Operations Director.",
"link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-006769.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:it_operations_director",
"@product": "Hitachi IT Operations Director",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management",
"@product": "Job Management Partner 1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager",
"@product": "Job Management Partner 1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_asset_information_manager",
"@product": "Job Management Partner 1/Asset Information Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_2",
"@product": "Job Management Partner 1/Automatic Job Management System 2",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_3",
"@product": "Job Management Partner 1/Automatic Job Management System 3",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_integrated_management",
"@product": "Job Management Partner 1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_it_service_level_management",
"@product": "Job Management Partner 1/IT Service Level Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_software_distribution_manager",
"@product": "Job Management Partner 1/Software Distribution Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fautomatic_operation",
"@product": "JP1/Automatic Operation",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager",
"@product": "JP1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_2",
"@product": "JP1/Automatic Job Management System 2",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_3",
"@product": "JP1/Automatic Job Management System 3",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_integrated_management",
"@product": "JP1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_integrated_manager",
"@product": "JP1/Integrated Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_it_desktop_management",
"@product": "JP1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_it_service_level_management",
"@product": "JP1/IT Service Level Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_netm_asset_information_manager",
"@product": "JP1/NETM/Asset Information Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_netm_dm",
"@product": "JP1/NETM/DM",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_operation_analytics",
"@product": "JP1/Operations Analytics",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_performance_analysis",
"@product": "JP1/Performance Analysis",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_serverconductor_control_manager",
"@product": "JP1/ServerConductor/Control Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_service_level_management",
"@product": "JP1/Service Level Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_service_support",
"@product": "JP1/Service Support",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
{
"@score": "5.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2017-006769",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director"
}
JVNDB-2016-008607
Vulnerability from jvndb - Published: 2017-06-30 15:55 - Updated:2019-07-25 14:14
Severity ?
Summary
Vulnerability in Cosminexus HTTP Server and Hitachi Web Server
Details
A vulnerability (CVE-2016-8743) exists in Cosminexus HTTP Server and Hitachi Web Server.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html",
"dc:date": "2019-07-25T14:14+09:00",
"dcterms:issued": "2017-06-30T15:55+09:00",
"dcterms:modified": "2019-07-25T14:14+09:00",
"description": "A vulnerability (CVE-2016-8743) exists in Cosminexus HTTP Server and Hitachi Web Server.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html",
"sec:cpe": [
{
"#text": "cpe:/a:apache:http_server",
"@product": "Apache HTTP Server",
"@vendor": "Apache Software Foundation",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_http_server",
"@product": "Cosminexus HTTP Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_application_server",
"@product": "Hitachi Application Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_application_server_for_developers",
"@product": "Hitachi Application Server for Developers",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_web_server",
"@product": "Hitachi Web Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:it_operations_director",
"@product": "Hitachi IT Operations Director",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management",
"@product": "Job Management Partner 1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager",
"@product": "Job Management Partner 1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_integrated_management",
"@product": "Job Management Partner 1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console",
"@product": "Job Management Partner 1/Performance Management - Web Console",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fautomatic_operation",
"@product": "JP1/Automatic Operation",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager",
"@product": "JP1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_3",
"@product": "JP1/Automatic Job Management System 3",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_integrated_management",
"@product": "JP1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_it_desktop_management",
"@product": "JP1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_operation_analytics",
"@product": "JP1/Operations Analytics",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_service_support",
"@product": "JP1/Service Support",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server",
"@product": "uCosminexus Application Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise",
"@product": "uCosminexus Application Server Enterprise",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition",
"@product": "uCosminexus Application Server Smart Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_standard",
"@product": "uCosminexus Application Server Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer",
"@product": "uCosminexus Developer",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_light",
"@product": "uCosminexus Developer Light",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_standard",
"@product": "uCosminexus Developer Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_primary_server",
"@product": "uCosminexus Primary Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_architect",
"@product": "uCosminexus Service Architect",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_platform",
"@product": "uCosminexus Service Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "4.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-008607",
"sec:references": [
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743",
"@id": "CVE-2016-8743",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975",
"@id": "CVE-2016-4975",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"@id": "CVE-2016-8743",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975",
"@id": "CVE-2016-4975",
"@source": "NVD"
},
{
"#text": "https://cwe.mitre.org/data/definitions/19.html",
"@id": "CWE-19",
"@title": "Data Handling(CWE-19)"
}
],
"title": "Vulnerability in Cosminexus HTTP Server and Hitachi Web Server"
}
JVNDB-2014-002800
Vulnerability from jvndb - Published: 2014-06-12 11:43 - Updated:2015-03-03 16:59Summary
Multiple Vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option
Details
Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option contains cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities can not be exploited, unless logging in these products.
References
| Type | URL | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-002800.html",
"dc:date": "2015-03-03T16:59+09:00",
"dcterms:issued": "2014-06-12T11:43+09:00",
"dcterms:modified": "2015-03-03T16:59+09:00",
"description": "Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option contains cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.\r\n\r\nThese vulnerabilities can not be exploited, unless logging in these products.",
"link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-002800.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:tuning_manager",
"@product": "Hitachi Tuning Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "3.5",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2014-002800",
"sec:references": [
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4188",
"@id": "CVE-2014-4188",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4189",
"@id": "CVE-2014-4189",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4188",
"@id": "CVE-2014-4188",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4189",
"@id": "CVE-2014-4189",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "Multiple Vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option"
}
JVNDB-2013-001605
Vulnerability from jvndb - Published: 2013-02-22 20:09 - Updated:2013-02-22 20:09Summary
Multiple vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management
Details
Hitachi Tuning Manager, JP1/Performance Management - Web Console, and JP1/Performance Management - Manager Web Option contain Cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities can not be exploited, unless logging in these products.
References
| Type | URL | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-001605.html",
"dc:date": "2013-02-22T20:09+09:00",
"dcterms:issued": "2013-02-22T20:09+09:00",
"dcterms:modified": "2013-02-22T20:09+09:00",
"description": "Hitachi Tuning Manager, JP1/Performance Management - Web Console, and JP1/Performance Management - Manager Web Option contain Cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.\r\n\r\nThese vulnerabilities can not be exploited, unless logging in these products.",
"link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-001605.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console",
"@product": "Job Management Partner 1/Performance Management - Web Console",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:tuning_manager",
"@product": "Hitachi Tuning Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "9.0",
"@severity": "High",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2013-001605",
"sec:references": [
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "Multiple vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management"
}
JVNDB-2011-001928
Vulnerability from jvndb - Published: 2011-08-09 10:11 - Updated:2011-08-09 10:11Summary
JP1/Performance Management - Web Console Cross-Site Scripting Vulnerability
Details
JP1/Performance Management - Web Console contains a cross-site scripting vulnerability.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-001928.html",
"dc:date": "2011-08-09T10:11+09:00",
"dcterms:issued": "2011-08-09T10:11+09:00",
"dcterms:modified": "2011-08-09T10:11+09:00",
"description": "JP1/Performance Management - Web Console contains a cross-site scripting vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-001928.html",
"sec:cpe": {
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:cvss": {
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2011-001928",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
},
"title": "JP1/Performance Management - Web Console Cross-Site Scripting Vulnerability"
}
JVNDB-2010-001877
Vulnerability from jvndb - Published: 2010-09-01 14:12 - Updated:2010-09-01 14:12Summary
Denial of Service (DoS) Vulnerability in JP1/PAM
Details
A Built-in database in JP1/Performance Analysis - Manager and JP1/Performance Management - Analysis Manager (JP1/PAM) contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.
After the process abends, the service can be restarted by rebooting JP1/PAM.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001877.html",
"dc:date": "2010-09-01T14:12+09:00",
"dcterms:issued": "2010-09-01T14:12+09:00",
"dcterms:modified": "2010-09-01T14:12+09:00",
"description": "A Built-in database in JP1/Performance Analysis - Manager and JP1/Performance Management - Analysis Manager (JP1/PAM) contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.\r\nAfter the process abends, the service can be restarted by rebooting JP1/PAM.",
"link": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001877.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_performance_analysis",
"@product": "JP1/Performance Analysis",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2010-001877",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Denial of Service (DoS) Vulnerability in JP1/PAM"
}
JVNDB-2006-000983
Vulnerability from jvndb - Published: 2008-05-21 00:00 - Updated:2008-05-21 00:00Summary
JP1 Request Handling Denial of Service Vulnerabilities
Details
Hitachi JP1 products fails to handle unexpected requests and data, which could be exploited to cause a denial of service condition.
References
| Type | URL | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000983.html",
"dc:date": "2008-05-21T00:00+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2008-05-21T00:00+09:00",
"description": "Hitachi JP1 products fails to handle unexpected requests and data, which could be exploited to cause a denial of service condition.",
"link": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000983.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:cm2_network_node_manager",
"@product": "Cm2/Network Node Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_2",
"@product": "Job Management Partner 1/Automatic Job Management System 2",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_base",
"@product": "Job Management Partner 1/Base",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_2",
"@product": "JP1/Automatic Job Management System 2",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_base",
"@product": "JP1/Base",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_cm2_extensible_agent",
"@product": "JP1/Cm2/Extensible Agent",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_cm2_hierarchical_agent",
"@product": "JP1/Cm2/Hierarchical Agent",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_cm2_network_node_manager",
"@product": "JP1/Cm2/Network Node Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_cm2_operations_assist",
"@product": "JP1/Cm2/Operations Assist",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_cm2_submanager",
"@product": "JP1/Cm2/SubManager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_file_access_control",
"@product": "JP1/File Access Control",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_pfm_snmp_system_observer",
"@product": "JP1/PFM/SNMP System Observer",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_security_integrated_manager",
"@product": "JP1/Security Integrated Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_serverconductor_blade_server_manager",
"@product": "JP1/ServerConductor/Blade Server Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_serverconductor_deployment_manager",
"@product": "JP1/ServerConductor/Deployment Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_serverconductor_server_manager",
"@product": "JP1/ServerConductor/Server Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_server_system_observer",
"@product": "JP1/Server System Observer",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:serverconductor_blade_server_manager",
"@product": "ServerConductor/Blade Server Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:serverconductor_deployment_manager",
"@product": "ServerConductor/Deployment Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:serverconductor_server_manager",
"@product": "ServerConductor/Server Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:system_manager",
"@product": "System Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2006-000983",
"sec:references": [
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2068",
"@id": "CVE-2006-2068",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-2068",
"@id": "CVE-2006-2068",
"@source": "NVD"
},
{
"#text": "http://secunia.com/advisories/19841",
"@id": "SA19841",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/17706",
"@id": "17706",
"@source": "BID"
},
{
"#text": "http://xforce.iss.net/xforce/xfdb/26087",
"@id": "26087",
"@source": "XF"
},
{
"#text": "http://www.frsirt.com/english/advisories/2006/1524",
"@id": "FrSIRT/ADV-2006-1524",
"@source": "FRSIRT"
}
],
"title": "JP1 Request Handling Denial of Service Vulnerabilities"
}