Search criteria

18 vulnerabilities found for it_operations_director by hitachi

FKIE_CVE-2021-29644

Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Impacted products
Vendor Product Version
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management_2-manager *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/remote_control_agent *
hitachi jp1\/remote_control_agent *
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
              "versionEndIncluding": "02-50-07",
              "versionStartIncluding": "02-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
              "versionEndIncluding": "03-00-12",
              "versionStartIncluding": "03-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
              "versionEndIncluding": "04-00-17",
              "versionStartIncluding": "04-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
              "versionEndIncluding": "04-50-16",
              "versionStartIncluding": "04-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
              "versionEndIncluding": "10-01-06",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
              "versionEndIncluding": "10-50-11",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
              "versionEndIncluding": "08-00-04",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
              "versionEndIncluding": "08-10-05",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
              "versionEndIncluding": "09-00-07",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
              "versionEndIncluding": "09-51-15",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
              "versionEndIncluding": "08-00-05",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
              "versionEndIncluding": "08-00-07",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
              "versionEndIncluding": "09-51-05",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
              "versionEndIncluding": "10-00-02",
              "versionStartIncluding": "10-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
              "versionEndIncluding": "10-01-05",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
              "versionEndIncluding": "10-02-05",
              "versionStartIncluding": "10-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
              "versionEndIncluding": "10-50-12",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
              "versionEndIncluding": "11-00-11",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59729765-7E55-4EA4-A36F-41F8C7BA9221",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59",
              "versionEndIncluding": "08-01-04",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F81A6FF3-B711-46B6-A747-77F85CAC1FA4",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59068DB-3EF7-4733-803B-6EBD2786101E",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36E43A0-E8C0-4423-95EF-A0E19E95ED44",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6",
              "versionEndIncluding": "08-12-03",
              "versionStartIncluding": "08-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60604B3B-7BDD-4B19-9CD0-845AACD05588",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD919A5-E1A8-42D8-A911-CB0160F0BB67",
              "versionEndIncluding": "08-51-17",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "675C27EE-230F-4731-8F70-CD3EDFD8A338",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85B6AAD-97DE-44FE-AD5E-142EE6B59F91",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A61900-9F48-43A8-9EBB-1C63BDD7A11B",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C4AF03-3D44-4423-9A0F-D77CE1FB468F",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4",
              "versionEndIncluding": "09-12-16",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9344AABE-A55C-466D-8CBA-8E1A856599D9",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3A3C28-86B6-4C76-BCDE-CE16522EC02A",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC840D4-E8C0-4035-8882-D707454E62D7",
              "versionEndIncluding": "10-10-23",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "208B6E96-4B2F-41BD-87C5-FD9FBEF75C84",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D75DF6-9062-446B-9589-7F9BB1614192",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FAD30C-105D-415C-B4FC-0AE598584CF1",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA754AB-E821-4D77-8549-F78AAC28DB80",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82626BAE-B8F7-4BA5-9888-755CC5966C6B",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "922CD860-52AB-42C3-99FA-4AA1E0BE2534",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81529DD1-6551-4175-80E6-432B4A95FD0D",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2505E3A-E0AD-4814-876C-B4FBDB458F0F",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61719C00-AE97-49E8-AA27-5A18A2DEC234",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B078427F-B51C-4F28-A4F3-EB61FFC66B02",
              "versionEndIncluding": "09-10-13",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADC497C4-1063-4F0F-A23A-49334BF77ECB",
              "versionEndIncluding": "09-50-19",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B30C5-F863-44D5-9E36-8183BCDB25C1",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F6D082-AA59-4F7C-A0AC-45016E451469",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6955554-2A1E-45A2-8C0E-38E87955A11F",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C859F1-D44C-4A48-BF30-8CB0D344EEF0",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0911EE99-E8EA-482F-993F-63CA578157F6",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97FCFAE-5731-483E-9DB1-B15C1F10B292",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F95B95-3D0D-4B12-B2AF-3FC3C9341232",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B3F4C6-32FE-41B8-AB64-F47053D12686",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A5DBD-5E00-430F-9556-4D7DD7F26EBA",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1F9438-0952-4B83-AA04-B3825D29438D",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2",
              "versionEndIncluding": "09-12-15",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E652FA6-D612-458C-BA72-29346A0AC5FB",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85912BE6-5606-4DF2-B021-DDA9C579C169",
              "versionEndIncluding": "10-10-24",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1597B309-9C51-48A9-8DC5-DB6ED05EF9CF",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FBB16A-1FF3-44FF-9023-9E21E9064335",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAFA401-1F96-4400-8BF8-F1F1C99DB455",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12ACA7E-7A79-49B4-91BA-BF99105C3C07",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A228B5AB-EDB0-4A36-8414-101B86B19195",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA1805D-967E-4048-B3F6-3667274606F4",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69568387-3EA3-4438-852F-CD221C8EF970",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A622280-D90B-4C00-8F09-4095490867F8",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35863FFC-1077-44CF-9EE1-E3A29B387976",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA",
              "versionEndIncluding": "11-00-02",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2F87F38-CF16-4F9A-93FE-7355C982ACB1",
              "versionEndIncluding": "12-00-01",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
    },
    {
      "lang": "es",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\u00eda explotar este problema para ejecutar c\u00f3digo con privilegios no restringidos en el sistema operativo subyacente"
    }
  ],
  "id": "CVE-2021-29644",
  "lastModified": "2024-11-21T06:01:33.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-12T19:15:07.620",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-29645

Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Impacted products
Vendor Product Version
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management_2-manager *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/remote_control_feature *
hitachi jp1\/remote_control_feature *
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
              "versionEndIncluding": "02-50-07",
              "versionStartIncluding": "02-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
              "versionEndIncluding": "03-00-12",
              "versionStartIncluding": "03-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
              "versionEndIncluding": "04-00-17",
              "versionStartIncluding": "04-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
              "versionEndIncluding": "04-50-16",
              "versionStartIncluding": "04-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
              "versionEndIncluding": "10-01-06",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
              "versionEndIncluding": "10-50-11",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
              "versionEndIncluding": "08-00-04",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
              "versionEndIncluding": "08-10-05",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
              "versionEndIncluding": "09-00-07",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
              "versionEndIncluding": "09-51-15",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
              "versionEndIncluding": "08-00-05",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
              "versionEndIncluding": "08-00-07",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
              "versionEndIncluding": "09-51-05",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
              "versionEndIncluding": "10-00-02",
              "versionStartIncluding": "10-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
              "versionEndIncluding": "10-01-05",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
              "versionEndIncluding": "10-02-05",
              "versionStartIncluding": "10-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
              "versionEndIncluding": "10-50-12",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
              "versionEndIncluding": "11-00-11",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC313F8-478C-4445-8FF4-4C3D4452B88D",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31099812-DFC5-4205-8D5F-6C8FC5CA71AD",
              "versionEndIncluding": "08-01-04",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0CAD86-355F-4DBE-A397-A7497533F6EF",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA36C31-7753-42E8-8752-9EA286A31D5B",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73018662-C036-40AB-B85C-6D84FAD4B937",
              "versionEndIncluding": "08-12-03",
              "versionStartIncluding": "08-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98F6AD56-5D63-4C1A-9B19-0845F5B298FD",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "561DA909-0503-4B1B-B132-E06157EAFD15",
              "versionEndIncluding": "08-51-17",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10FDCBE-17E7-4C05-BD7E-128E5500A461",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2133302-B6F4-48E0-A3E8-2EF971F4D349",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0012F47A-9F14-4305-A7CB-6A7F09D7224B",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A24A5E-A62F-4D67-8A17-7E58E6C61C94",
              "versionEndIncluding": "09-12-16",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC78F4B-E608-46F9-941B-9522A5B9106E",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8467AC9A-66C5-4EF1-A430-8B9176ECFEBF",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9057F305-7CAD-4CBE-BE9C-5669831A9FE6",
              "versionEndIncluding": "10-10-23",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD1AFB9-87CD-4751-8F41-888E7056F256",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B69D310-5149-4986-AFCC-400992F7B14E",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0218938-33D0-454E-8341-FADEEA90529C",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D283D2-6122-492F-A31D-E0C8EBB8D152",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF19CFBE-D55A-4054-BD5C-2A06590C1A3B",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "773C6952-5080-4DA7-966D-556218293088",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F23999-9338-4311-8340-ECB08E3F31B2",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B8B1E-F13E-4B23-ACFE-877A72576C99",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B65371A-8686-44C9-99BC-111C0DF4C919",
              "versionEndIncluding": "09-10-13",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BA5BF2-B522-47EB-8A7B-38C08FAFD71D",
              "versionEndIncluding": "09-50-19",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F0C0B3-EE46-40A3-B3C3-1122173289F9",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D500C8CA-F351-403C-9DD9-B158F83A3EB5",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99EC517-62E4-44FD-9079-1975ACEE8889",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED1F992D-103C-4EE9-AFE2-3B4F204C36E7",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE2D087-E798-4446-B570-5A9B44DDA8C5",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0536E8B8-1590-45C1-9D0D-0B99F5D2C248",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD3518E-A2BC-45E8-AACF-54E3B7F28394",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA24699-08F2-4DEF-B9CB-9D0BD8977309",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAC1C287-47F7-42A4-9DC1-3454DF43D11E",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22525249-56B6-46A9-8ADC-533645E288B9",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F308CDDC-B026-46D7-B23A-DABA40EF65A1",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE06C8C-7653-400E-B5E2-FCB6B2326ED4",
              "versionEndIncluding": "09-12-15",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23272F34-B271-448C-B631-C4800F716E7B",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E04AA952-315D-475D-B1A9-A66469FE1F9E",
              "versionEndIncluding": "10-10-24",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "672D8CDE-47C5-413C-BB2B-FF8388D530F2",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8998308-E56A-4541-8091-AB8841367C62",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F1B409-8698-4CA7-AC96-EAE24FA0CC51",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C194761-70AB-4032-8751-6517572DFC4F",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7851FE95-219E-4E99-A0D3-C5C96C03DC46",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84E52AFB-9D8F-4969-A458-177DA4555E67",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A36817D-2F89-45F5-8045-B3ADBB10B5E4",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "315B8EBE-40DB-4CEE-852C-94DCF5861DC1",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C2F07D-C94F-413E-AECA-35226D13D150",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB7B46E-A3A7-4082-9495-2687608E9F3A",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F",
              "versionEndIncluding": "11-00-02",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0140D278-CB13-4375-AA57-9D57EA82A14D",
              "versionEndIncluding": "12-00-011",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
    },
    {
      "lang": "es",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\u00eda ejecutar c\u00f3digo arbitrario en el sistema local"
    }
  ],
  "id": "CVE-2021-29645",
  "lastModified": "2024-11-21T06:01:33.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-12T19:15:07.677",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4697

Vulnerability from fkie_nvd - Published: 2013-07-31 13:20 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:09-51:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA045D6-F5F2-4689-A657-90DCF19B2CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:09-51-05:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A52750B-EEA2-4EB0-9B1B-C991DD7426D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "29E7D17E-5FC1-4A55-BFDE-106F503FEEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-00-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "922FB52B-E062-4644-97D6-97F04EB9CE86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FB2037-D0CF-41A1-84D7-61A8C2E15D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:10-01-02:*:*:*:*:*:*:*",
              "matchCriteriaId": "52393221-F674-4997-A1EC-125C538CF742",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:09-50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDA22F8-28DF-4194-B822-F70E01A4D048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:09-50-03:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD52AE70-5C08-4D4F-970A-871DA3391F29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:10-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "89902E80-D1C9-4F5D-9461-16A035AE1A69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D42EEA9F-9CC7-457F-95F1-21A6E864BF63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C490690E-8057-4A10-B369-E5C3C4579030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6B360B9-B7A2-434D-B62F-B73CEC189CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:04-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "27681F1A-3CAA-4BB9-8F74-FF221102942C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:04-00-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4A9C96-E645-4D85-94C7-82C8C9E884B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades en Hitachi JP1/IT Desktop Management - Manager 09-50 a la 09-50-03, 09-51 a la 09-51-05, 10-00 a la 10-00-02, y 10-01 a la 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 a la 09-50-03 y 10-01; e Hitachi IT Operations Director 02-50 a la 02-50-07, 03-00 a la 03-00-12, y 04-00 a la 04-00-01, permite a usuarios autenticados remotamente elevar sus privilegios a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2013-4697",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-31T13:20:19.103",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-4276

Vulnerability from fkie_nvd - Published: 2012-08-13 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada  en Hitachi IT Operations Director v02-50-01 a v02-50-07,  y v03-00 a v03-00-08, permite a atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores de ataque desconocidos.\r\n"
    }
  ],
  "id": "CVE-2012-4276",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-13T22:55:01.693",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49144"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-4275

Vulnerability from fkie_nvd - Published: 2012-08-13 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8EFBBB-C3A7-4499-ACA8-F2588C0D6A64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Hitachi IT Operations Director v02-50-01 a v02-50-07, v03-00 antes de v03-00-08, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados.\r\n"
    }
  ],
  "id": "CVE-2012-4275",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-13T22:55:01.663",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49144"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-0919

Vulnerability from fkie_nvd - Published: 2012-01-24 18:55 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB620DE-D5D2-47E4-99BE-458D4EF9C2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-06:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E60630B-1700-48D5-B48E-39229972D3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:02-50-07:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A2281A-7169-4330-AFCA-ADC7B6C1F9BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4310CB2-AE65-4FB5-90E8-B3EF93F64DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:03-00-04:*:*:*:*:*:*:*",
              "matchCriteriaId": "794286CE-648C-4198-8FAB-FC0869EF1705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Hitachi IT Operations Director 02-50-01 hasta 02-50-07, 03-00 hasta 03-00-04, y posiblemente otras versiones antes de 03-00-06, permite a atacantes remotos inyectar secuencias de comandos web o THML a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-0919",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-01-24T18:55:01.910",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/78215"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47490"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/51340"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/78215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-29645 (GCVE-0-2021-29645)

Vulnerability from cvelistv5 – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:30:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29645",
    "datePublished": "2021-10-12T18:30:35",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-29644 (GCVE-0-2021-29644)

Vulnerability from cvelistv5 – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.349Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:19:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29644",
    "datePublished": "2021-10-12T18:19:29",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4697 (GCVE-0-2013-4697)

Vulnerability from cvelistv5 – Published: 2013-07-31 01:00 – Updated: 2024-09-16 17:59
VLAI?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN00065218/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.328Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
          },
          {
            "name": "JVN#00065218",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
          },
          {
            "name": "JVNDB-2013-000076",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-31T01:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
        },
        {
          "name": "JVN#00065218",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
        },
        {
          "name": "JVNDB-2013-000076",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4697",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
            },
            {
              "name": "JVN#00065218",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
            },
            {
              "name": "JVNDB-2013-000076",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4697",
    "datePublished": "2013-07-31T01:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:59:05.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4275 (GCVE-0-2012-4275)

Vulnerability from cvelistv5 – Published: 2012-08-13 22:00 – Updated: 2024-09-17 04:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49144 third-party-advisoryx_refsource_SECUNIA
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:28:07.855Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49144",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49144",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4275",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49144",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49144"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4275",
    "datePublished": "2012-08-13T22:00:00Z",
    "dateReserved": "2012-08-13T00:00:00Z",
    "dateUpdated": "2024-09-17T04:03:56.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4276 (GCVE-0-2012-4276)

Vulnerability from cvelistv5 – Published: 2012-08-13 22:00 – Updated: 2024-09-16 18:54
VLAI?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49144 third-party-advisoryx_refsource_SECUNIA
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:28:07.688Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49144",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49144",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49144",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49144"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4276",
    "datePublished": "2012-08-13T22:00:00Z",
    "dateReserved": "2012-08-13T00:00:00Z",
    "dateUpdated": "2024-09-16T18:54:27.254Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0919 (GCVE-0-2012-0919)

Vulnerability from cvelistv5 – Published: 2012-01-24 18:00 – Updated: 2024-08-06 18:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/47490 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/51340 vdb-entryx_refsource_BID
http://osvdb.org/78215 vdb-entryx_refsource_OSVDB
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:15.217Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "47490",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47490"
          },
          {
            "name": "51340",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51340"
          },
          {
            "name": "78215",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78215"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
          },
          {
            "name": "hitachi-it-unspecified-xss(72248)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "47490",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47490"
        },
        {
          "name": "51340",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51340"
        },
        {
          "name": "78215",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78215"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
        },
        {
          "name": "hitachi-it-unspecified-xss(72248)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-0919",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "47490",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47490"
            },
            {
              "name": "51340",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51340"
            },
            {
              "name": "78215",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78215"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
            },
            {
              "name": "hitachi-it-unspecified-xss(72248)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-0919",
    "datePublished": "2012-01-24T18:00:00",
    "dateReserved": "2012-01-24T00:00:00",
    "dateUpdated": "2024-08-06T18:38:15.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-29645 (GCVE-0-2021-29645)

Vulnerability from nvd – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:30:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29645",
    "datePublished": "2021-10-12T18:30:35",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-29644 (GCVE-0-2021-29644)

Vulnerability from nvd – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.349Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:19:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29644",
    "datePublished": "2021-10-12T18:19:29",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4697 (GCVE-0-2013-4697)

Vulnerability from nvd – Published: 2013-07-31 01:00 – Updated: 2024-09-16 17:59
VLAI?
Summary
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN00065218/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.328Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
          },
          {
            "name": "JVN#00065218",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
          },
          {
            "name": "JVNDB-2013-000076",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-31T01:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
        },
        {
          "name": "JVN#00065218",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
        },
        {
          "name": "JVNDB-2013-000076",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4697",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-017/index.html"
            },
            {
              "name": "JVN#00065218",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN00065218/index.html"
            },
            {
              "name": "JVNDB-2013-000076",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000076"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4697",
    "datePublished": "2013-07-31T01:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:59:05.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4275 (GCVE-0-2012-4275)

Vulnerability from nvd – Published: 2012-08-13 22:00 – Updated: 2024-09-17 04:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49144 third-party-advisoryx_refsource_SECUNIA
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:28:07.855Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49144",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49144",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4275",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49144",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49144"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4275",
    "datePublished": "2012-08-13T22:00:00Z",
    "dateReserved": "2012-08-13T00:00:00Z",
    "dateUpdated": "2024-09-17T04:03:56.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4276 (GCVE-0-2012-4276)

Vulnerability from nvd – Published: 2012-08-13 22:00 – Updated: 2024-09-16 18:54
VLAI?
Summary
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49144 third-party-advisoryx_refsource_SECUNIA
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:28:07.688Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49144",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49144",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49144",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49144"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4276",
    "datePublished": "2012-08-13T22:00:00Z",
    "dateReserved": "2012-08-13T00:00:00Z",
    "dateUpdated": "2024-09-16T18:54:27.254Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0919 (GCVE-0-2012-0919)

Vulnerability from nvd – Published: 2012-01-24 18:00 – Updated: 2024-08-06 18:38
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/47490 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/51340 vdb-entryx_refsource_BID
http://osvdb.org/78215 vdb-entryx_refsource_OSVDB
http://www.hitachi.co.jp/Prod/comp/soft1/global/s… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:15.217Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "47490",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47490"
          },
          {
            "name": "51340",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51340"
          },
          {
            "name": "78215",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/78215"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
          },
          {
            "name": "hitachi-it-unspecified-xss(72248)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "47490",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47490"
        },
        {
          "name": "51340",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51340"
        },
        {
          "name": "78215",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/78215"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
        },
        {
          "name": "hitachi-it-unspecified-xss(72248)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-0919",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 through 03-00-04, and possibly other versions before 03-00-06, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "47490",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47490"
            },
            {
              "name": "51340",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51340"
            },
            {
              "name": "78215",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/78215"
            },
            {
              "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html"
            },
            {
              "name": "hitachi-it-unspecified-xss(72248)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72248"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-0919",
    "datePublished": "2012-01-24T18:00:00",
    "dateReserved": "2012-01-24T00:00:00",
    "dateUpdated": "2024-08-06T18:38:15.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}