Search criteria
18 vulnerabilities found for it_operations_director by hitachi
FKIE_CVE-2021-29644
Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
"versionEndIncluding": "02-50-07",
"versionStartIncluding": "02-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
"versionEndIncluding": "03-00-12",
"versionStartIncluding": "03-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
"versionEndIncluding": "04-00-17",
"versionStartIncluding": "04-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
"versionEndIncluding": "04-50-16",
"versionStartIncluding": "04-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
"versionEndIncluding": "10-01-06",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
"versionEndIncluding": "10-50-11",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
"versionEndIncluding": "08-00-04",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
"versionEndIncluding": "08-10-05",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
"versionEndIncluding": "09-00-07",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
"versionEndIncluding": "09-51-15",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
"versionEndIncluding": "08-00-05",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
"versionEndIncluding": "08-00-07",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
"versionEndIncluding": "09-51-05",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
"versionEndIncluding": "10-00-02",
"versionStartIncluding": "10-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
"versionEndIncluding": "10-01-05",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
"versionEndIncluding": "10-02-05",
"versionStartIncluding": "10-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
"versionEndIncluding": "10-50-12",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
"versionEndIncluding": "11-00-11",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59729765-7E55-4EA4-A36F-41F8C7BA9221",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59",
"versionEndIncluding": "08-01-04",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F81A6FF3-B711-46B6-A747-77F85CAC1FA4",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C59068DB-3EF7-4733-803B-6EBD2786101E",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E43A0-E8C0-4423-95EF-A0E19E95ED44",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6",
"versionEndIncluding": "08-12-03",
"versionStartIncluding": "08-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60604B3B-7BDD-4B19-9CD0-845AACD05588",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD919A5-E1A8-42D8-A911-CB0160F0BB67",
"versionEndIncluding": "08-51-17",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "675C27EE-230F-4731-8F70-CD3EDFD8A338",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F85B6AAD-97DE-44FE-AD5E-142EE6B59F91",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98A61900-9F48-43A8-9EBB-1C63BDD7A11B",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C4AF03-3D44-4423-9A0F-D77CE1FB468F",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4",
"versionEndIncluding": "09-12-16",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9344AABE-A55C-466D-8CBA-8E1A856599D9",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D3A3C28-86B6-4C76-BCDE-CE16522EC02A",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC840D4-E8C0-4035-8882-D707454E62D7",
"versionEndIncluding": "10-10-23",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "208B6E96-4B2F-41BD-87C5-FD9FBEF75C84",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36D75DF6-9062-446B-9589-7F9BB1614192",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FAD30C-105D-415C-B4FC-0AE598584CF1",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA754AB-E821-4D77-8549-F78AAC28DB80",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82626BAE-B8F7-4BA5-9888-755CC5966C6B",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "922CD860-52AB-42C3-99FA-4AA1E0BE2534",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81529DD1-6551-4175-80E6-432B4A95FD0D",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2505E3A-E0AD-4814-876C-B4FBDB458F0F",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61719C00-AE97-49E8-AA27-5A18A2DEC234",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B078427F-B51C-4F28-A4F3-EB61FFC66B02",
"versionEndIncluding": "09-10-13",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC497C4-1063-4F0F-A23A-49334BF77ECB",
"versionEndIncluding": "09-50-19",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "673B30C5-F863-44D5-9E36-8183BCDB25C1",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F6D082-AA59-4F7C-A0AC-45016E451469",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6955554-2A1E-45A2-8C0E-38E87955A11F",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15C859F1-D44C-4A48-BF30-8CB0D344EEF0",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0911EE99-E8EA-482F-993F-63CA578157F6",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C97FCFAE-5731-483E-9DB1-B15C1F10B292",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93F95B95-3D0D-4B12-B2AF-3FC3C9341232",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32B3F4C6-32FE-41B8-AB64-F47053D12686",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795A5DBD-5E00-430F-9556-4D7DD7F26EBA",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F1F9438-0952-4B83-AA04-B3825D29438D",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2",
"versionEndIncluding": "09-12-15",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E652FA6-D612-458C-BA72-29346A0AC5FB",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85912BE6-5606-4DF2-B021-DDA9C579C169",
"versionEndIncluding": "10-10-24",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1597B309-9C51-48A9-8DC5-DB6ED05EF9CF",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FBB16A-1FF3-44FF-9023-9E21E9064335",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAFA401-1F96-4400-8BF8-F1F1C99DB455",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C12ACA7E-7A79-49B4-91BA-BF99105C3C07",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A228B5AB-EDB0-4A36-8414-101B86B19195",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA1805D-967E-4048-B3F6-3667274606F4",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69568387-3EA3-4438-852F-CD221C8EF970",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A622280-D90B-4C00-8F09-4095490867F8",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35863FFC-1077-44CF-9EE1-E3A29B387976",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA",
"versionEndIncluding": "11-00-02",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2F87F38-CF16-4F9A-93FE-7355C982ACB1",
"versionEndIncluding": "12-00-01",
"versionStartIncluding": "12-00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
},
{
"lang": "es",
"value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\u00eda explotar este problema para ejecutar c\u00f3digo con privilegios no restringidos en el sistema operativo subyacente"
}
],
"id": "CVE-2021-29644",
"lastModified": "2024-11-21T06:01:33.450",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-12T19:15:07.620",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-29645
Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
"versionEndIncluding": "02-50-07",
"versionStartIncluding": "02-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
"versionEndIncluding": "03-00-12",
"versionStartIncluding": "03-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
"versionEndIncluding": "04-00-17",
"versionStartIncluding": "04-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
"versionEndIncluding": "04-50-16",
"versionStartIncluding": "04-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
"versionEndIncluding": "10-01-06",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
"versionEndIncluding": "10-50-11",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
"versionEndIncluding": "08-00-04",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
"versionEndIncluding": "08-10-05",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
"versionEndIncluding": "09-00-07",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
"versionEndIncluding": "09-51-15",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
"versionEndIncluding": "08-00-05",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
"versionEndIncluding": "08-00-07",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
"versionEndIncluding": "09-51-05",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
"versionEndIncluding": "10-00-02",
"versionStartIncluding": "10-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
"versionEndIncluding": "10-01-05",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
"versionEndIncluding": "10-02-05",
"versionStartIncluding": "10-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
"versionEndIncluding": "10-50-12",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
"versionEndIncluding": "11-00-11",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC313F8-478C-4445-8FF4-4C3D4452B88D",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31099812-DFC5-4205-8D5F-6C8FC5CA71AD",
"versionEndIncluding": "08-01-04",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0CAD86-355F-4DBE-A397-A7497533F6EF",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA36C31-7753-42E8-8752-9EA286A31D5B",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73018662-C036-40AB-B85C-6D84FAD4B937",
"versionEndIncluding": "08-12-03",
"versionStartIncluding": "08-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98F6AD56-5D63-4C1A-9B19-0845F5B298FD",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "561DA909-0503-4B1B-B132-E06157EAFD15",
"versionEndIncluding": "08-51-17",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C10FDCBE-17E7-4C05-BD7E-128E5500A461",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2133302-B6F4-48E0-A3E8-2EF971F4D349",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0012F47A-9F14-4305-A7CB-6A7F09D7224B",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61A24A5E-A62F-4D67-8A17-7E58E6C61C94",
"versionEndIncluding": "09-12-16",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC78F4B-E608-46F9-941B-9522A5B9106E",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8467AC9A-66C5-4EF1-A430-8B9176ECFEBF",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9057F305-7CAD-4CBE-BE9C-5669831A9FE6",
"versionEndIncluding": "10-10-23",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD1AFB9-87CD-4751-8F41-888E7056F256",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B69D310-5149-4986-AFCC-400992F7B14E",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0218938-33D0-454E-8341-FADEEA90529C",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13D283D2-6122-492F-A31D-E0C8EBB8D152",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF19CFBE-D55A-4054-BD5C-2A06590C1A3B",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "773C6952-5080-4DA7-966D-556218293088",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37F23999-9338-4311-8340-ECB08E3F31B2",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9B8B1E-F13E-4B23-ACFE-877A72576C99",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B65371A-8686-44C9-99BC-111C0DF4C919",
"versionEndIncluding": "09-10-13",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57BA5BF2-B522-47EB-8A7B-38C08FAFD71D",
"versionEndIncluding": "09-50-19",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34F0C0B3-EE46-40A3-B3C3-1122173289F9",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D500C8CA-F351-403C-9DD9-B158F83A3EB5",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E99EC517-62E4-44FD-9079-1975ACEE8889",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1F992D-103C-4EE9-AFE2-3B4F204C36E7",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE2D087-E798-4446-B570-5A9B44DDA8C5",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0536E8B8-1590-45C1-9D0D-0B99F5D2C248",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD3518E-A2BC-45E8-AACF-54E3B7F28394",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA24699-08F2-4DEF-B9CB-9D0BD8977309",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC1C287-47F7-42A4-9DC1-3454DF43D11E",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22525249-56B6-46A9-8ADC-533645E288B9",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F308CDDC-B026-46D7-B23A-DABA40EF65A1",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE06C8C-7653-400E-B5E2-FCB6B2326ED4",
"versionEndIncluding": "09-12-15",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23272F34-B271-448C-B631-C4800F716E7B",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E04AA952-315D-475D-B1A9-A66469FE1F9E",
"versionEndIncluding": "10-10-24",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "672D8CDE-47C5-413C-BB2B-FF8388D530F2",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8998308-E56A-4541-8091-AB8841367C62",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F1B409-8698-4CA7-AC96-EAE24FA0CC51",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C194761-70AB-4032-8751-6517572DFC4F",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7851FE95-219E-4E99-A0D3-C5C96C03DC46",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84E52AFB-9D8F-4969-A458-177DA4555E67",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A36817D-2F89-45F5-8045-B3ADBB10B5E4",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "315B8EBE-40DB-4CEE-852C-94DCF5861DC1",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37C2F07D-C94F-413E-AECA-35226D13D150",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB7B46E-A3A7-4082-9495-2687608E9F3A",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F",
"versionEndIncluding": "11-00-02",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0140D278-CB13-4375-AA57-9D57EA82A14D",
"versionEndIncluding": "12-00-011",
"versionStartIncluding": "12-00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
},
{
"lang": "es",
"value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\u00eda ejecutar c\u00f3digo arbitrario en el sistema local"
}
],
"id": "CVE-2021-29645",
"lastModified": "2024-11-21T06:01:33.630",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-12T19:15:07.677",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4697
Vulnerability from fkie_nvd - Published: 2013-07-31 13:20 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hitachi | jp1\/it_desktop_management-manager | 09-51 | |
| hitachi | jp1\/it_desktop_management-manager | 09-51-05 | |
| hitachi | jp1\/it_desktop_management-manager | 10-00 | |
| hitachi | jp1\/it_desktop_management-manager | 10-00-02 | |
| hitachi | jp1\/it_desktop_management-manager | 10-01 | |
| hitachi | jp1\/it_desktop_management-manager | 10-01-02 | |
| hitachi | job_management_partner_1\/it_desktop_management-manager | 09-50 | |
| hitachi | job_management_partner_1\/it_desktop_management-manager | 09-50-03 | |
| hitachi | job_management_partner_1\/it_desktop_management-manager | 10-01 | |
| hitachi | it_operations_director | 02-50 | |
| hitachi | it_operations_director | 02-50-01 | |
| hitachi | it_operations_director | 02-50-06 | |
| hitachi | it_operations_director | 02-50-07 | |
| hitachi | it_operations_director | 03-00 | |
| hitachi | it_operations_director | 03-00-04 | |
| hitachi | it_operations_director | 03-00-07 | |
| hitachi | it_operations_director | 03-00-08 | |
| hitachi | it_operations_director | 03-00-12 | |
| hitachi | it_operations_director | 04-00 | |
| hitachi | it_operations_director | 04-00-01 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:09-51:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA045D6-F5F2-4689-A657-90DCF19B2CEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:09-51-05:*:*:*:*:*:*:*",
"matchCriteriaId": "4A52750B-EEA2-4EB0-9B1B-C991DD7426D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-00:*:*:*:*:*:*:*",
"matchCriteriaId": "29E7D17E-5FC1-4A55-BFDE-106F503FEEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-00-02:*:*:*:*:*:*:*",
"matchCriteriaId": "922FB52B-E062-4644-97D6-97F04EB9CE86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-01:*:*:*:*:*:*:*",
"matchCriteriaId": "88FB2037-D0CF-41A1-84D7-61A8C2E15D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-01-02:*:*:*:*:*:*:*",
"matchCriteriaId": "52393221-F674-4997-A1EC-125C538CF742",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:09-50:*:*:*:*:*:*:*",
"matchCriteriaId": "4FDA22F8-28DF-4194-B822-F70E01A4D048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:09-50-03:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52AE70-5C08-4D4F-970A-871DA3391F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:10-01:*:*:*:*:*:*:*",
"matchCriteriaId": "89902E80-D1C9-4F5D-9461-16A035AE1A69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50:*:*:*:*:*:*:*",
"matchCriteriaId": "D42EEA9F-9CC7-457F-95F1-21A6E864BF63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
"matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
"matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
"matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
"matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-08:*:*:*:*:*:*:*",
"matchCriteriaId": "C490690E-8057-4A10-B369-E5C3C4579030",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-12:*:*:*:*:*:*:*",
"matchCriteriaId": "A6B360B9-B7A2-434D-B62F-B73CEC189CEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:04-00:*:*:*:*:*:*:*",
"matchCriteriaId": "27681F1A-3CAA-4BB9-8F74-FF221102942C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:04-00-01:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4A9C96-E645-4D85-94C7-82C8C9E884B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en Hitachi JP1/IT Desktop Management - Manager 09-50 a la 09-50-03, 09-51 a la 09-51-05, 10-00 a la 10-00-02, y 10-01 a la 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 a la 09-50-03 y 10-01; e Hitachi IT Operations Director 02-50 a la 02-50-07, 03-00 a la 03-00-12, y 04-00 a la 04-00-01, permite a usuarios autenticados remotamente elevar sus privilegios a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2013-4697",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-07-31T13:20:19.103",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-4276
Vulnerability from fkie_nvd - Published: 2012-08-13 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hitachi | it_operations_director | 02-50-01 | |
| hitachi | it_operations_director | 02-50-06 | |
| hitachi | it_operations_director | 02-50-07 | |
| hitachi | it_operations_director | 03-00 | |
| hitachi | it_operations_director | 03-00-04 | |
| hitachi | it_operations_director | 03-00-07 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
"matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
"matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
"matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
"matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad no especificada en Hitachi IT Operations Director v02-50-01 a v02-50-07, y v03-00 a v03-00-08, permite a atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores de ataque desconocidos.\r\n"
}
],
"id": "CVE-2012-4276",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-13T22:55:01.693",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49144"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-4275
Vulnerability from fkie_nvd - Published: 2012-08-13 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hitachi | it_operations_director | 02-50-01 | |
| hitachi | it_operations_director | 02-50-06 | |
| hitachi | it_operations_director | 02-50-07 | |
| hitachi | it_operations_director | 03-00 | |
| hitachi | it_operations_director | 03-00-04 | |
| hitachi | it_operations_director | 03-00-07 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
"matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
"matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
"matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
"matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Hitachi IT Operations Director v02-50-01 a v02-50-07, v03-00 antes de v03-00-08, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados.\r\n"
}
],
"id": "CVE-2012-4275",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-13T22:55:01.663",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49144"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-0919
Vulnerability from fkie_nvd - Published: 2012-01-24 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hitachi | it_operations_director | 02-50-01 | |
| hitachi | it_operations_director | 02-50-06 | |
| hitachi | it_operations_director | 02-50-07 | |
| hitachi | it_operations_director | 03-00 | |
| hitachi | it_operations_director | 03-00-04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
"matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
"matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
"matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
"matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Hitachi IT Operations Director 02-50-01 hasta 02-50-07, 03-00 hasta 03-00-04, y posiblemente otras versiones antes de 03-00-06, permite a atacantes remotos inyectar secuencias de comandos web o THML a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2012-0919",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-01-24T18:55:01.910",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/78215"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47490"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/51340"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/78215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47490"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/51340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-29645 (GCVE-0-2021-29645)
Vulnerability from cvelistv5 – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:30:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29645",
"datePublished": "2021-10-12T18:30:35",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29644 (GCVE-0-2021-29644)
Vulnerability from cvelistv5 – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Severity ?
8.1 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.349Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:19:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29644",
"datePublished": "2021-10-12T18:19:29",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.349Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4697 (GCVE-0-2013-4697)
Vulnerability from cvelistv5 – Published: 2013-07-31 01:00 – Updated: 2024-09-16 17:59
VLAI?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.328Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-07-31T01:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4697",
"datePublished": "2013-07-31T01:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:59:05.694Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4275 (GCVE-0-2012-4275)
Vulnerability from cvelistv5 – Published: 2012-08-13 22:00 – Updated: 2024-09-17 04:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.855Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-13T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-4275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49144"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-4275",
"datePublished": "2012-08-13T22:00:00Z",
"dateReserved": "2012-08-13T00:00:00Z",
"dateUpdated": "2024-09-17T04:03:56.147Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4276 (GCVE-0-2012-4276)
Vulnerability from cvelistv5 – Published: 2012-08-13 22:00 – Updated: 2024-09-16 18:54
VLAI?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.688Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-13T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-4276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49144"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-4276",
"datePublished": "2012-08-13T22:00:00Z",
"dateReserved": "2012-08-13T00:00:00Z",
"dateUpdated": "2024-09-16T18:54:27.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-0919 (GCVE-0-2012-0919)
Vulnerability from cvelistv5 – Published: 2012-01-24 18:00 – Updated: 2024-08-06 18:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:15.217Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "47490",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/78215"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "47490",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/78215"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0919",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "47490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"refsource": "OSVDB",
"url": "http://osvdb.org/78215"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-0919",
"datePublished": "2012-01-24T18:00:00",
"dateReserved": "2012-01-24T00:00:00",
"dateUpdated": "2024-08-06T18:38:15.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29645 (GCVE-0-2021-29645)
Vulnerability from nvd – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:30:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29645",
"datePublished": "2021-10-12T18:30:35",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29644 (GCVE-0-2021-29644)
Vulnerability from nvd – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Severity ?
8.1 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.349Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:19:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29644",
"datePublished": "2021-10-12T18:19:29",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.349Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4697 (GCVE-0-2013-4697)
Vulnerability from nvd – Published: 2013-07-31 01:00 – Updated: 2024-09-16 17:59
VLAI?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.328Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-07-31T01:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
},
{
"name": "JVN#00065218",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN00065218/index.html"
},
{
"name": "JVNDB-2013-000076",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4697",
"datePublished": "2013-07-31T01:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:59:05.694Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4275 (GCVE-0-2012-4275)
Vulnerability from nvd – Published: 2012-08-13 22:00 – Updated: 2024-09-17 04:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.855Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-13T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-4275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49144"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-4275",
"datePublished": "2012-08-13T22:00:00Z",
"dateReserved": "2012-08-13T00:00:00Z",
"dateUpdated": "2024-09-17T04:03:56.147Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4276 (GCVE-0-2012-4276)
Vulnerability from nvd – Published: 2012-08-13 22:00 – Updated: 2024-09-16 18:54
VLAI?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.688Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-13T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "49144",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-4276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49144"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-4276",
"datePublished": "2012-08-13T22:00:00Z",
"dateReserved": "2012-08-13T00:00:00Z",
"dateUpdated": "2024-09-16T18:54:27.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-0919 (GCVE-0-2012-0919)
Vulnerability from nvd – Published: 2012-01-24 18:00 – Updated: 2024-08-06 18:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:15.217Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "47490",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/78215"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "47490",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/78215"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0919",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "47490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47490"
},
{
"name": "51340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51340"
},
{
"name": "78215",
"refsource": "OSVDB",
"url": "http://osvdb.org/78215"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
},
{
"name": "hitachi-it-unspecified-xss(72248)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-0919",
"datePublished": "2012-01-24T18:00:00",
"dateReserved": "2012-01-24T00:00:00",
"dateUpdated": "2024-08-06T18:38:15.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}