var-201004-0011
Vulnerability from variot

Unspecified vulnerability in multiple versions of Hitachi JP1/Automatic Job Management System 2 - View, JP1/Integrated Management - View, and JP1/Cm2/SNMP System Observer, allows remote attackers to cause a denial of service ("abnormal" termination) via vectors related to the display of an "invalid GIF file.". Hitachi JP1 / Cm2 / Hierarchical is a middleware platform software. Hitachi JP1 / Automatic Job Management System 2-View, JP1 / Integrated Management-View, and multiple versions of JP1 / Cm2 / SNMP System Observer have unknown vulnerabilities. Remote attackers can trigger rejection by displaying "Invalid GIF file". Service (& ldquo; Exception & rdquo; Termination). Multiple Hitachi products are prone to a denial-of-service vulnerability caused by an unspecified error. Attackers can exploit this issue to terminate the affected applications, causing a denial-of-service condition. Affected products include the following: JP1/Automatic Job Management System 2 - View JP1/Integrated Management - View JP1/Cm2/SNMP System Observer For the full list of affected products, please see the referenced vendor advisory. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

SOLUTION: Update to a fixed version. Please see the vendor's advisory for details.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-016/index.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201004-0011",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "08-10-11"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "08-50-08"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "08-50"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "07-10"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "07-10-\\/h"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "06-71-\\/q"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "08-10"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "job management partner 1\\/integrated management-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-01"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00-g1"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00-04"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "jp1\\/integrated management-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-\\/p1"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50-17"
      },
      {
        "model": "jp1\\/server system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10-04"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-10-11"
      },
      {
        "model": "job management partner 1\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-11"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-11-02"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-11-03"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00-13"
      },
      {
        "model": "job management partner 1\\/integrated manager-console view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1\\/integrated manager-console view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00-\\/a"
      },
      {
        "model": "jp1\\/server system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-\\/f"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10-02"
      },
      {
        "model": "jp1\\/server system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "job management partner 1\\/integrated manager-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10-05"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-50-03"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-n1"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71-\\/m"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-50-02"
      },
      {
        "model": "jp1\\/integrated manager-console view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10-01"
      },
      {
        "model": "jp1\\/cm2\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1\\/server system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71-03"
      },
      {
        "model": "jp1\\/integrated manager-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-51"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-11"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-10-10"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-\\/n"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-10-03"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50-17"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00-\\/e"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-50-01"
      },
      {
        "model": "job management partner 1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-50"
      },
      {
        "model": "jp1\\/cm2\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00-09"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00-\\/k"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00-\\/g"
      },
      {
        "model": "jp1\\/server system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71-\\/h"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-01-05"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00"
      },
      {
        "model": "jp1\\/integrated manager-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-10"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-00-13"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-10-\\/b"
      },
      {
        "model": "job management partner 1\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-\\/a"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-11-15"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51-\\/p"
      },
      {
        "model": "job management partner 1\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "jp1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-01"
      },
      {
        "model": "jp1\\/integrated management-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-50-06"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-71-m1"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "jp1\\/performance management\\/snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "07-50-09"
      },
      {
        "model": "jp1 integrated management service support",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "08-11-01"
      },
      {
        "model": "job management partner 1\\/automatic job management system 2-view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "job management partner 1\\/integrated manager-console view",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "job management partner 1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "job management partner 1/integrated management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "job management partner 1/integrated manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- console view"
      },
      {
        "model": "job management partner 1/integrated manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "job management partner 1/performance management/snmp system observer",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "job management partner 1/snmp system observer",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "jp1/cm2/snmp system observer",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/integrated management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "jp1/integrated manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- console view"
      },
      {
        "model": "jp1/integrated manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "- view"
      },
      {
        "model": "jp1/performance management/snmp system observer",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/server system observer",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/automatic job management system agent",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "2-"
      },
      {
        "model": "jp1/integrated management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/snmp system observer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "09-00"
      },
      {
        "model": "jp1/cm2/snmp system observer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/automatic job management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "20"
      },
      {
        "model": "product name: jp1/integrated management view",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-09-00"
      },
      {
        "model": "jp1/cm2/snmp system observer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "09-00"
      },
      {
        "model": "jp1/cm2/snmp system observer )",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "09-00"
      },
      {
        "model": "jp1/automatic job management system view",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "3-09-00"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-03:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-03:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-05:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-03:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-00-\\/k:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-51-\\/p1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-50-17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-50-08:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10-11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-11-15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-01-05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10-\\/h:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-10-11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-00-g1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-00-13:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:08-01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-71-\\/q:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-11-15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-71-\\/q:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10-\\/h:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-10-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-51-\\/p:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/automatic_job_management_system_2-view:07-50-17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-50-17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-71-m1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:08-00-04:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-00-\\/g:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-00-\\/a:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-51-n1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:08-00-13:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:08-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-51-\\/n:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-00-\\/g:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:07-50-17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/automatic_job_management_system_2-view:06-71-\\/m:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_manager-view:07-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_manager-console_view:06-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_management-view:08-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/integrated_manager-view:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/integrated_manager-console_view:06-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_management-view:08-50-06:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_manager-view:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/integrated_manager-console_view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/integrated_manager-console_view:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/integrated_management-view:08-01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/cm2\\/snmp_system_observer:08-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/cm2\\/snmp_system_observer:08-00-09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-10-\\/b:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-50-09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-00-\\/e:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/performance_management\\/snmp_system_observer:07-10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/server_system_observer:06-71-03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/server_system_observer:06-71-\\/h:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/server_system_observer:06-51-\\/f:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/server_system_observer:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:jp1\\/server_system_observer:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/performance_management\\/snmp_system_observer:07-00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/snmp_system_observer:06-51-\\/a:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/snmp_system_observer:06-71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:hitachi:job_management_partner_1\\/snmp_system_observer:06-51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi",
    "sources": [
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-4777",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-001968",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2010-4810",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2009-4777",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-001968",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2010-4810",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201004-349",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in multiple versions of Hitachi JP1/Automatic Job Management System 2 - View, JP1/Integrated Management - View, and JP1/Cm2/SNMP System Observer, allows remote attackers to cause a denial of service (\"abnormal\" termination) via vectors related to the display of an \"invalid GIF file.\". Hitachi JP1 / Cm2 / Hierarchical is a middleware platform software. Hitachi JP1 / Automatic Job Management System 2-View, JP1 / Integrated Management-View, and multiple versions of JP1 / Cm2 / SNMP System Observer have unknown vulnerabilities. Remote attackers can trigger rejection by displaying \"Invalid GIF file\". Service (\u0026 ldquo; Exception \u0026 rdquo; Termination). Multiple Hitachi products are prone to a denial-of-service vulnerability caused by an unspecified error. \nAttackers can exploit this issue to terminate the affected applications, causing a denial-of-service condition. \nAffected products include the following:\nJP1/Automatic Job Management System 2 - View\nJP1/Integrated Management - View\nJP1/Cm2/SNMP System Observer\nFor the full list of affected products, please see the referenced vendor advisory. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nSOLUTION:\nUpdate to a fixed version. Please see the vendor\u0027s advisory for\ndetails. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-016/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "PACKETSTORM",
        "id": "81079"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-4777",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "36311",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "36646",
        "trust": 2.6
      },
      {
        "db": "OSVDB",
        "id": "57832",
        "trust": 2.4
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-2576",
        "trust": 2.4
      },
      {
        "db": "HITACHI",
        "id": "HS09-016",
        "trust": 2.0
      },
      {
        "db": "XF",
        "id": "53115",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "81079",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "PACKETSTORM",
        "id": "81079"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "id": "VAR-201004-0011",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      }
    ],
    "trust": 1.0857142949999998
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:09:54.085000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS09-016",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs09-016/index.html"
      },
      {
        "title": "Patch for Hitachi Multiple Products Invalid GIF File Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/37678"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.securityfocus.com/bid/36311"
      },
      {
        "trust": 2.4,
        "url": "http://osvdb.org/57832"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/36646"
      },
      {
        "trust": 2.4,
        "url": "http://www.vupen.com/english/advisories/2009/2576"
      },
      {
        "trust": 2.0,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs09-016/index.html"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/53115"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53115"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4777"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4777"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.com/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/36646/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "PACKETSTORM",
        "id": "81079"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "db": "BID",
        "id": "36311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "db": "PACKETSTORM",
        "id": "81079"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-04-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "date": "2009-09-09T00:00:00",
        "db": "BID",
        "id": "36311"
      },
      {
        "date": "2009-09-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "date": "2009-09-09T16:35:33",
        "db": "PACKETSTORM",
        "id": "81079"
      },
      {
        "date": "2010-04-21T14:30:00.583000",
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "date": "2010-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-04-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-4810"
      },
      {
        "date": "2015-04-13T21:06:00",
        "db": "BID",
        "id": "36311"
      },
      {
        "date": "2009-09-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      },
      {
        "date": "2017-08-17T01:31:45.303000",
        "db": "NVD",
        "id": "CVE-2009-4777"
      },
      {
        "date": "2010-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "GIF File Processing Denial of Service Vulnerability in Multiple JP1 Products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001968"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201004-349"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.