All the vulnerabilites related to hp - universal_cmbd_foundation
Vulnerability from fkie_nvd
Published
2016-04-12 23:59
Modified
2024-11-21 02:47
Summary
HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11, and 10.20 allows remote attackers to obtain sensitive information or conduct URL redirection attacks via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC3120E-4D93-48EA-B9BF-52F6977F471D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA100E6A-DA01-4218-877C-8BC9BBDB6492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB1F1CD-D4AC-413E-86CE-B9184E598383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B771DD1-6E58-4B87-97A3-6AE14C12B934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE51B2D-7DF1-4508-B5A3-032E20A46188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11, and 10.20 allows remote attackers to obtain sensitive information or conduct URL redirection attacks via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11 y 10.20 permite a atacantes remotos obtener informaci\u00f3n sensible o llevar a cabo ataques de redireccionamiento de URL a trav\u00e9s de vectores no especificados."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/601.html\"\u003eCWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\u003c/a\u003e",
  "id": "CVE-2016-2001",
  "lastModified": "2024-11-21T02:47:34.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-12T23:59:36.510",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1035505"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-08 14:59
Modified
2024-11-21 02:51
Summary
The Universal Discovery component in HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20, and 10.21 allows remote attackers to obtain sensitive information via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC3120E-4D93-48EA-B9BF-52F6977F471D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA100E6A-DA01-4218-877C-8BC9BBDB6492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB1F1CD-D4AC-413E-86CE-B9184E598383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B771DD1-6E58-4B87-97A3-6AE14C12B934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE51B2D-7DF1-4508-B5A3-032E20A46188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D56642-E7F5-4BE6-961F-4BBAE8A88E14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Universal Discovery component in HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20, and 10.21 allows remote attackers to obtain sensitive information via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "El componente Universal Discovery en HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20 y 10.21 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2016-4367",
  "lastModified": "2024-11-21T02:51:57.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-08T14:59:57.567",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036050"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-08 14:59
Modified
2024-11-21 02:51
Severity ?
Summary
HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC3120E-4D93-48EA-B9BF-52F6977F471D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA100E6A-DA01-4218-877C-8BC9BBDB6492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB1F1CD-D4AC-413E-86CE-B9184E598383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B771DD1-6E58-4B87-97A3-6AE14C12B934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE51B2D-7DF1-4508-B5A3-032E20A46188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D56642-E7F5-4BE6-961F-4BBAE8A88E14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFBF73-570C-44DF-8D72-C56B2DEFAB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1933BF-A0CB-4829-920D-0CC064749726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77916DDD-6005-4E8F-A3CC-C7581EEB37F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE8791E-1397-48B0-BDD6-E085AD43C8B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACCC4C6A-7D9B-4664-89AD-48FFE3517335",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_configuration_manager:10.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC95092-E0A9-4269-88C0-258EB0C5BFAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0FC8DA-FB4E-45A5-A340-E9C5962BC920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BDE22A-E753-4807-936C-A8545B3849D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF1C0E2-BA76-4206-9E8F-6ECCBAE5329E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6623FD-2113-4966-B72F-46A7E7B4ABDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "074205F5-1AE3-47E3-9E86-454625AE0FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_discovery:10.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF19B5E6-B2E0-4C56-B1A0-0144A8C95BFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library."
    },
    {
      "lang": "es",
      "value": "HPE Universal CMDB 10.0 hasta la versi\u00f3n 10.21, Universal CMDB Configuration Manager 10.0 hasta la versi\u00f3n 10.21 y Universal Discovery 10.0 hasta la versi\u00f3n 10.21 permiten a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un objeto Java serializado manipulado, relacionado con la librer\u00eda Apache Commons Collections (ACC)."
    }
  ],
  "id": "CVE-2016-4368",
  "lastModified": "2024-11-21T02:51:57.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-08T14:59:59.880",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-10-22 21:15
Modified
2024-11-21 04:58
Summary
Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code.
References
security@opentext.comhttp://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html
security@opentext.comhttp://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747657
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747658
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747854
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747948
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747949
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03747950
security@opentext.comhttps://softwaresupport.softwaregrp.com/doc/KM03749879
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747657
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747658
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747854
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747948
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747949
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03747950
af854a3a-2127-422b-91ae-364da2661108https://softwaresupport.softwaregrp.com/doc/KM03749879
Impacted products
Vendor Product Version
microfocus operation_bridge_manager *
microfocus operation_bridge_manager 10.11
microfocus operation_bridge_manager 10.12
microfocus operation_bridge_manager 10.60
microfocus operation_bridge_manager 10.61
microfocus operation_bridge_manager 10.62
microfocus operation_bridge_manager 10.63
microfocus operations_bridge_manager 2017.11
microfocus operations_bridge_manager 2018.02
microfocus operations_bridge_manager 2018.05
microfocus operations_bridge_manager 2018.08
microfocus operations_bridge_manager 2018.11
microfocus operations_bridge_manager 2019.05
microfocus operations_bridge_manager 2019.08
microfocus operations_bridge_manager 2019.11
microfocus operations_bridge_manager 2020.05
hp universal_cmbd_foundation 10.20
hp universal_cmbd_foundation 10.30
hp universal_cmbd_foundation 10.31
hp universal_cmbd_foundation 10.32
hp universal_cmbd_foundation 10.33
hp universal_cmbd_foundation 11.0
hp universal_cmbd_foundation 2018.05
hp universal_cmbd_foundation 2018.08
hp universal_cmbd_foundation 2018.11
hp universal_cmbd_foundation 2019.02
hp universal_cmbd_foundation 2019.05
hp universal_cmbd_foundation 2019.11
hp universal_cmbd_foundation 2020.05.
microfocus application_performance_management 9.40
microfocus application_performance_management 9.50
microfocus application_performance_management 9.51
microfocus data_center_automation *
microfocus hybrid_cloud_management *
microfocus service_manager_automation 2020.02
microfocus service_manager_automation 2020.05



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BA18A2-15CE-48B7-8F13-8C0476804B3B",
              "versionEndIncluding": "10.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D910D663-EE30-4EFF-8558-0B8B709819E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D2F315-A890-487D-8EFE-ECA8EAC7FEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCFB90A-4A8F-4D30-AF04-BBAD86989B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B43056-AB61-4F0C-AB94-F90AB31D27F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF64CB5-6F17-4CCD-A003-1464FE4899C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operation_bridge_manager:10.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "11500010-6600-4AB0-866C-493387E13761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2017.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D8CF48-8374-4E55-9247-D5A3419FC99D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "74ACF007-0FD3-4D06-9632-4EC39BAAF32D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A2E37C-69DC-42AC-BE72-475561249F24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "918B50F0-28E3-4AA7-80F0-EF4288CBD4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F169AF11-4F4D-4A17-8808-8F5E5822D17C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B2691B-246F-4305-943F-392062AD7C9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2019.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED30B9-1926-4837-B080-94FD7DDE68D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F113173-2ECD-4FF6-A664-A9AABFD448CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE51B2D-7DF1-4508-B5A3-032E20A46188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D7D80AC-FB54-47A3-81A5-DFB5BB6A15DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A60D591-60F6-4CE6-9AE3-47BF4CF95AE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C0BC34-52AB-4F53-A145-F162CB877402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:10.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5D2048-E648-4D2A-89F6-2A69873E761F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9079A929-F91A-4884-98B5-E35457299975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2018.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "645685F7-B350-4962-B3CC-8BB5DBA23FD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2018.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "043CB83F-534C-4685-89CD-4D64EBB5E827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2018.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B4D5CD-32CD-4C77-B0F5-B141ABC6EF37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2019.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "70541547-BDBC-4208-82AC-B02B4C3A327A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2019.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD0E1AD-BF98-4378-8DCA-F9BDB68906BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2019.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA36063-7673-400A-A24C-7DBC6E63CDDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:universal_cmbd_foundation:2020.05.:*:*:*:*:*:*:*",
              "matchCriteriaId": "699C61B7-FFBB-4CBC-A446-CF5B43E209F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:application_performance_management:9.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C520D74-D011-4C1E-9429-BA0A38BC0D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3938F6-E50A-480B-8219-0B210983525E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:application_performance_management:9.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "C419162B-A41C-49D0-9293-5F10B8A911EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:data_center_automation:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA6ADC1-7E2E-4550-9E1F-762EFAAE26A2",
              "versionEndIncluding": "2019.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48D21D35-C6EC-4EFA-94E1-80AD1FA9275A",
              "versionEndIncluding": "2020.05",
              "versionStartIncluding": "2018.05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:service_manager_automation:2020.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDEA01BB-0446-40CD-999A-BC2B5F4A4AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microfocus:service_manager_automation:2020.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D73BD57-90E9-42BE-9BAD-BA7F3FE252FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario que afecta a m\u00faltiples productos de Micro Focus. 1.) Operation Bridge Manager que afecta a las versiones: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versiones 10.6x y 10.1x y versiones anteriores. 2.) Application Performance Management que afecta a las versiones: 9.51, 9.50 y 9.40 con uCMDB 10.33 CUP 3 3.) Data Center Automation que afecta a la versi\u00f3n 2019.11 4.) Operations Bridge (contenedor) afectando a las versiones: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) CMDB universal que afecta a las versiones: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management que afecta a la versi\u00f3n 2020.05 7.) Service Management Automation que afecta a la versi\u00f3n 2020.5 y 2020.02. La vulnerabilidad podr\u00eda permitir a los atacantes remotos ejecutar c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2020-11853",
  "lastModified": "2024-11-21T04:58:45.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@opentext.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-22T21:15:12.747",
  "references": [
    {
      "source": "security@opentext.com",
      "url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
    },
    {
      "source": "security@opentext.com",
      "url": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747948"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747949"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747950"
    },
    {
      "source": "security@opentext.com",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03749879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747949"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03747950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://softwaresupport.softwaregrp.com/doc/KM03749879"
    }
  ],
  "sourceIdentifier": "security@opentext.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2016-4368
Vulnerability from cvelistv5
Published
2016-06-08 14:00
Modified
2024-08-06 00:25
Severity ?
Summary
HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:25:14.531Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-06-08T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-4368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-4368",
    "datePublished": "2016-06-08T14:00:00",
    "dateReserved": "2016-04-29T00:00:00",
    "dateUpdated": "2024-08-06T00:25:14.531Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-2001
Vulnerability from cvelistv5
Published
2016-04-12 23:00
Modified
2024-08-05 23:17
Severity ?
Summary
HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11, and 10.20 allows remote attackers to obtain sensitive information or conduct URL redirection attacks via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:17:49.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504"
          },
          {
            "name": "1035505",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035505"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11, and 10.20 allows remote attackers to obtain sensitive information or conduct URL redirection attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-30T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504"
        },
        {
          "name": "1035505",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035505"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-2001",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HPE Universal CMDB Foundation 10.0, 10.01, 10.10, 10.11, and 10.20 allows remote attackers to obtain sensitive information or conduct URL redirection attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073504"
            },
            {
              "name": "1035505",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035505"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-2001",
    "datePublished": "2016-04-12T23:00:00",
    "dateReserved": "2016-01-22T00:00:00",
    "dateUpdated": "2024-08-05T23:17:49.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-11853
Vulnerability from cvelistv5
Published
2020-10-22 20:37
Modified
2024-08-04 11:42
Summary
Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code.
Impacted products
Vendor Product Version
Micro Focus Application Performance Management Version: 9.51
Version: 9.50
Version: 9.40
Micro Focus Data Center Automation Version: 2019.11
Micro Focus Operations Bridge (containerized) Version: 2019.11
Version: 2019.08
Version: 2019.05
Version: 2018.11
Version: 2018.08
Version: 2018.05
Version: 2018.02
Version: 2017.11
Micro Focus Universal CMDB Version: 2020.05
Version: 2019.11
Version: 2019.05
Version: 2019.02
Version: 2018.11
Version: 2018.08
Version: 2018.05
Version: 11.0
Version: 10.33
Version: 10.32
Version: 10.31
Version: 10.30
Micro Focus Hybrid Cloud Management Version: 2018.05   <
Micro Focus Service Management Automation Version: 2020.05
Version: 2020.02
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:42:00.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03749879"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747949"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747948"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747950"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Operation Bridge Manager ",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2020.5"
            },
            {
              "status": "affected",
              "version": "2019.11"
            },
            {
              "status": "affected",
              "version": "2019.05"
            },
            {
              "status": "affected",
              "version": "2018.11"
            },
            {
              "status": "affected",
              "version": "2018.05"
            },
            {
              "lessThanOrEqual": "10.63",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Application Performance Management ",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "9.51"
            },
            {
              "status": "affected",
              "version": "9.50"
            },
            {
              "status": "affected",
              "version": "9.40"
            }
          ]
        },
        {
          "product": "Data Center Automation",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2019.11"
            }
          ]
        },
        {
          "product": "Operations Bridge (containerized)",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2019.11"
            },
            {
              "status": "affected",
              "version": "2019.08"
            },
            {
              "status": "affected",
              "version": "2019.05"
            },
            {
              "status": "affected",
              "version": "2018.11"
            },
            {
              "status": "affected",
              "version": "2018.08"
            },
            {
              "status": "affected",
              "version": "2018.05"
            },
            {
              "status": "affected",
              "version": "2018.02"
            },
            {
              "status": "affected",
              "version": "2017.11"
            }
          ]
        },
        {
          "product": "Universal CMDB ",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2020.05"
            },
            {
              "status": "affected",
              "version": "2019.11"
            },
            {
              "status": "affected",
              "version": "2019.05"
            },
            {
              "status": "affected",
              "version": "2019.02"
            },
            {
              "status": "affected",
              "version": "2018.11"
            },
            {
              "status": "affected",
              "version": "2018.08"
            },
            {
              "status": "affected",
              "version": "2018.05"
            },
            {
              "status": "affected",
              "version": "11.0"
            },
            {
              "status": "affected",
              "version": "10.33"
            },
            {
              "status": "affected",
              "version": "10.32"
            },
            {
              "status": "affected",
              "version": "10.31"
            },
            {
              "status": "affected",
              "version": "10.30"
            }
          ]
        },
        {
          "product": "Hybrid Cloud Management",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "lessThanOrEqual": "2020.05",
              "status": "affected",
              "version": "2018.05",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Service Management Automation ",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2020.05"
            },
            {
              "status": "affected",
              "version": "2020.02"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability. "
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-10T16:06:12",
        "orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
        "shortName": "microfocus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03749879"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747949"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747948"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747950"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Application Performance Management https://softwaresupport.softwaregrp.com/doc/KM03747657\nFor Data Center Automation https://softwaresupport.softwaregrp.com/doc/KM03749879\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\nFor Hybrid Cloud Management https://softwaresupport.softwaregrp.com/doc/KM03747949\nFor Universal CMDB https://softwaresupport.softwaregrp.com/doc/KM03747948\nFor Service Management Automation https://softwaresupport.softwaregrp.com/doc/KM03747950"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Arbitrary code execution vulnerability on multiple Micro Focus products ",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@microfocus.com",
          "ID": "CVE-2020-11853",
          "STATE": "PUBLIC",
          "TITLE": "Arbitrary code execution vulnerability on multiple Micro Focus products "
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Operation Bridge Manager ",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2020.5"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.05"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.63"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Application Performance Management ",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "9.51"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "9.50"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "9.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Data Center Automation",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2019.11"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Operations Bridge (containerized)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2019.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.02"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2017.11"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Universal CMDB ",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2020.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.02"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.33"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.32"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.31"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Hybrid Cloud Management",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "2018.05",
                            "version_value": "2020.05"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Service Management Automation ",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2020.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2020.02"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Micro Focus "
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability. "
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "Arbitrary code execution."
          }
        ],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747658",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747657",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747854",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03749879",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03749879"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747949",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747949"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747948",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747948"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747950",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747950"
            },
            {
              "name": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Application Performance Management https://softwaresupport.softwaregrp.com/doc/KM03747657\nFor Data Center Automation https://softwaresupport.softwaregrp.com/doc/KM03749879\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\nFor Hybrid Cloud Management https://softwaresupport.softwaregrp.com/doc/KM03747949\nFor Universal CMDB https://softwaresupport.softwaregrp.com/doc/KM03747948\nFor Service Management Automation https://softwaresupport.softwaregrp.com/doc/KM03747950"
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
    "assignerShortName": "microfocus",
    "cveId": "CVE-2020-11853",
    "datePublished": "2020-10-22T20:37:51",
    "dateReserved": "2020-04-16T00:00:00",
    "dateUpdated": "2024-08-04T11:42:00.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-4367
Vulnerability from cvelistv5
Published
2016-06-08 14:00
Modified
2024-08-06 00:25
Severity ?
Summary
The Universal Discovery component in HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20, and 10.21 allows remote attackers to obtain sensitive information via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:25:14.463Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1036050",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036050"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Universal Discovery component in HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20, and 10.21 allows remote attackers to obtain sensitive information via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-08-22T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1036050",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036050"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-4367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Universal Discovery component in HPE Universal CMDB 10.0, 10.01, 10.10, 10.11, 10.20, and 10.21 allows remote attackers to obtain sensitive information via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1036050",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036050"
            },
            {
              "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164813"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-4367",
    "datePublished": "2016-06-08T14:00:00",
    "dateReserved": "2016-04-29T00:00:00",
    "dateUpdated": "2024-08-06T00:25:14.463Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}