VAR-200911-0144
Vulnerability from variot - Updated: 2023-12-18 13:15Multiple unspecified vulnerabilities in the Advanced Management Module firmware before 2.50G for the IBM BladeCenter T 8720-2xx and 8730-2xx have unknown impact and attack vectors. The impact of these issues is currently unknown. We will update this BID when more information emerges. Versions prior to BladeCenter Advanced Management Module 2.50G are vulnerable. IBM BladeCenter is IBM's blade server
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200911-0144",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.36d"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.25i"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.26e"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.20f"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.20"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.25e"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.26b"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.25"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.01"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "1.00"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.34b"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42f"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.32d"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42d"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.26h"
},
{
"model": "advanced management module",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "2.50c"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.28g"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.36k"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.48d"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.36h"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42n"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.46c"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42t"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.26i"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.36g"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.48n"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.46j"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42o"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.48l"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.26k"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.42i"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.48c"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.48g"
},
{
"model": "advanced management module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "1.34e"
},
{
"model": "advanced management module",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "2.50g"
},
{
"model": "bladecenter t chassis",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8730"
},
{
"model": "bladecenter t chassis",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8720"
},
{
"model": "bladecenter ls41",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7972"
},
{
"model": "bladecenter ls21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7971"
},
{
"model": "bladecenter ls20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8850"
},
{
"model": "bladecenter js21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8844"
},
{
"model": "bladecenter js21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7988"
},
{
"model": "bladecenter js20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8842"
},
{
"model": "bladecenter hs40",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8839"
},
{
"model": "bladecenter hs21 xm",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7995"
},
{
"model": "bladecenter hs21 xm",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1915"
},
{
"model": "bladecenter hs21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8853"
},
{
"model": "bladecenter hs21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7995"
},
{
"model": "bladecenter hs21",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1885"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8843"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8832"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8678"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7981"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1884"
},
{
"model": "bladecenter hs20",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1883"
},
{
"model": "bladecenter hs12",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8028"
},
{
"model": "bladecenter hs12",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8014"
},
{
"model": "bladecenter hs12",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1916"
},
{
"model": "bladecenter advanced management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "2.50"
},
{
"model": "bladecenter advanced management module 1.42u build bpet42u",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter advanced management module 1.42u build bbet42u",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter advanced management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.42"
},
{
"model": "bladecenter advanced management module g",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "2.50"
}
],
"sources": [
{
"db": "BID",
"id": "36970"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.48l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.48d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.32d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.26k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.25i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.50c",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.48n:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.36h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.36g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.36d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.34e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.46j:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.46c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42o:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.26i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.26h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.26e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.26b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.48g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:2.48c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42n:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.42f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.36k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.34b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.28g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.25e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ibm:advanced_management_module_firmware:1.20f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:bladecenter:t:*:8730:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ibm:bladecenter:t:*:8720:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-3935"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM",
"sources": [
{
"db": "BID",
"id": "36970"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
],
"trust": 0.9
},
"cve": "CVE-2009-3935",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2009-3935",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-41381",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-3935",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200911-142",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-41381",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41381"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple unspecified vulnerabilities in the Advanced Management Module firmware before 2.50G for the IBM BladeCenter T 8720-2xx and 8730-2xx have unknown impact and attack vectors. \nThe impact of these issues is currently unknown. We will update this BID when more information emerges. \nVersions prior to BladeCenter Advanced Management Module 2.50G are vulnerable. IBM BladeCenter is IBM\u0027s blade server",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "BID",
"id": "36970"
},
{
"db": "VULHUB",
"id": "VHN-41381"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2009-3935",
"trust": 2.5
},
{
"db": "BID",
"id": "36970",
"trust": 2.0
},
{
"db": "VUPEN",
"id": "ADV-2009-3188",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-41381",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41381"
},
{
"db": "BID",
"id": "36970"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"id": "VAR-200911-0144",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41381"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:15:20.420000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advanced Management Module Firmware Update",
"trust": 0.8,
"url": "ftp://download2.boulder.ibm.com/ecc/sar/cma/xsa/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-3935"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "ftp://download2.boulder.ibm.com/ecc/sar/cma/xsa/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/36970"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/3188"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3935"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3935"
},
{
"trust": 0.3,
"url": "http://publib.boulder.ibm.com/infocenter/clresctr/vxrx/index.jsp?topic=/com.ibm.cluster.csm16.install.doc/am7il_blademm.html"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41381"
},
{
"db": "BID",
"id": "36970"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-41381"
},
{
"db": "BID",
"id": "36970"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-11-12T00:00:00",
"db": "VULHUB",
"id": "VHN-41381"
},
{
"date": "2009-11-10T00:00:00",
"db": "BID",
"id": "36970"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"date": "2009-11-12T17:54:58.610000",
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"date": "2009-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-01-06T00:00:00",
"db": "VULHUB",
"id": "VHN-41381"
},
{
"date": "2009-11-12T20:06:00",
"db": "BID",
"id": "36970"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-005113"
},
{
"date": "2010-01-06T05:00:00",
"db": "NVD",
"id": "CVE-2009-3935"
},
{
"date": "2009-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM BladeCenter T For Advanced Management Module Firmware vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-005113"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-142"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…