VAR-200408-0124
Vulnerability from variot - Updated: 2024-06-09 23:05HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attackers to cause a denial of service (hang) by accessing iLO using the TCP/IP reserved port zero. hewlett packard enterprise HPE Integrated Lights-Out There are unspecified vulnerabilities in the firmware.None. A successful attack can allow an attacker to cause the iLO service to crash, affectively denying service to legitimate users. iLO firmware prior to versions 1.55 is prone to this vulnerability. Integrated Lights-Out Advanced Package - Upgrades the Integrated Lights-Out processor to full virtual memory and control via a graphical console and virtual media
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200408-0124",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.15"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.15a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.50a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.51a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.42a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.10"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.16a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.50"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.40a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.20a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.26a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.6a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.41a"
},
{
"model": "integrated lights-out",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "1.27a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.9,
"vendor": "hp",
"version": "1.15"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.9,
"vendor": "hp",
"version": "1.10"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.10"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.42a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.50"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.15a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.51a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.27a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.50a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": null
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.16a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.20a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.41a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.15"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.6a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.40a"
},
{
"model": "hpe integrated lights-out",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": "hpe integrated lights-out firmware 1.26a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.16a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.26a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.27a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.20a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.15a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.41a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.40a"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.6,
"vendor": "hp",
"version": "1.6a"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.51"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.50"
},
{
"model": "integrated lights out",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.50"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.42"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.41"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.40"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.27"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.26"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.20"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.16"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.15"
},
{
"model": "integrated lights out a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.6"
},
{
"model": "integrated lights out",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "1.55"
}
],
"sources": [
{
"db": "BID",
"id": "10415"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.27a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.40a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.41a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.42a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.15a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.16a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.50a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.20a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.26a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.51a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP Security Bulletin\u203b security-alert@hp.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
}
],
"trust": 0.6
},
"cve": "CVE-2004-0525",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2004-0525",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-8955",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-0525",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200408-113",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-8955",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8955"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attackers to cause a denial of service (hang) by accessing iLO using the TCP/IP reserved port zero. hewlett packard enterprise HPE Integrated Lights-Out There are unspecified vulnerabilities in the firmware.None. \nA successful attack can allow an attacker to cause the iLO service to crash, affectively denying service to legitimate users. \niLO firmware prior to versions 1.55 is prone to this vulnerability. Integrated Lights-Out Advanced Package - Upgrades the Integrated Lights-Out processor to full virtual memory and control via a graphical console and virtual media",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0525"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "BID",
"id": "10415"
},
{
"db": "VULHUB",
"id": "VHN-8955"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-0525",
"trust": 3.6
},
{
"db": "BID",
"id": "10415",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113",
"trust": 0.7
},
{
"db": "HP",
"id": "SSRT4724",
"trust": 0.6
},
{
"db": "XF",
"id": "16251",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-8955",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8955"
},
{
"db": "BID",
"id": "10415"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"id": "VAR-200408-0124",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8955"
}
],
"trust": 0.01
},
"last_update_date": "2024-06-09T23:05:35.469000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HPE\u00a0Integrated\u00a0Lights\u00a0Out-iLO",
"trust": 0.8,
"url": "https://www.hpe.com/jp/ja/hpe-integrated-lights-out-ilo.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/10415"
},
{
"trust": 2.5,
"url": "http://seclists.org/lists/bugtraq/2004/may/0281.html"
},
{
"trust": 1.9,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16251"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0525"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/16251"
},
{
"trust": 0.3,
"url": "http://h18013.www1.hp.com/products/servers/management/ilo/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8955"
},
{
"db": "BID",
"id": "10415"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-8955"
},
{
"db": "BID",
"id": "10415"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-08-06T00:00:00",
"db": "VULHUB",
"id": "VHN-8955"
},
{
"date": "2004-05-26T00:00:00",
"db": "BID",
"id": "10415"
},
{
"date": "2024-06-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"date": "2004-05-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"date": "2004-08-06T04:00:00",
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-8955"
},
{
"date": "2009-07-12T05:16:00",
"db": "BID",
"id": "10415"
},
{
"date": "2024-06-07T09:11:00",
"db": "JVNDB",
"id": "JVNDB-2004-000944"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200408-113"
},
{
"date": "2018-10-30T16:26:20.200000",
"db": "NVD",
"id": "CVE-2004-0525"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP Integrated Lights Out Remote Denial of Service Vulnerability",
"sources": [
{
"db": "BID",
"id": "10415"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200408-113"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…