All the vulnerabilites related to Hitachi, Ltd - JP1/Performance Management
jvndb-2016-008607
Vulnerability from jvndb
Published
2017-06-30 15:55
Modified
2019-07-25 14:14
Severity ?
Summary
Vulnerability in Cosminexus HTTP Server and Hitachi Web Server
Details
A vulnerability (CVE-2016-8743) exists in Cosminexus HTTP Server and Hitachi Web Server.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html", "dc:date": "2019-07-25T14:14+09:00", "dcterms:issued": "2017-06-30T15:55+09:00", "dcterms:modified": "2019-07-25T14:14+09:00", "description": "A vulnerability (CVE-2016-8743) exists in Cosminexus HTTP Server and Hitachi Web Server.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html", "sec:cpe": [ { "#text": "cpe:/a:apache:http_server", "@product": "Apache HTTP Server", "@vendor": "Apache Software Foundation", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_http_server", "@product": "Cosminexus HTTP Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_application_server", "@product": "Hitachi Application Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_application_server_for_developers", "@product": "Hitachi Application Server for Developers", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_web_server", "@product": "Hitachi Web Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:it_operations_director", "@product": "Hitachi IT Operations Director", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management", "@product": "Job Management Partner 1/IT Desktop Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager", "@product": "Job Management Partner 1/IT Desktop Management - Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_integrated_management", "@product": "Job Management Partner 1/Integrated Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console", "@product": "Job Management Partner 1/Performance Management - Web Console", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fautomatic_operation", "@product": "JP1/Automatic Operation", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager", "@product": "JP1/IT Desktop Management - Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_3", "@product": "JP1/Automatic Job Management System 3", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_integrated_management", "@product": "JP1/Integrated Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_it_desktop_management", "@product": "JP1/IT Desktop Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_operation_analytics", "@product": "JP1/Operations Analytics", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_service_support", "@product": "JP1/Service Support", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server", "@product": "uCosminexus Application Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "@product": "uCosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition", "@product": "uCosminexus Application Server Smart Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_standard", "@product": "uCosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer", "@product": "uCosminexus Developer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_light", "@product": "uCosminexus Developer Light", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_standard", "@product": "uCosminexus Developer Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_primary_server", "@product": "uCosminexus Primary Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_architect", "@product": "uCosminexus Service Architect", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_platform", "@product": "uCosminexus Service Platform", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-008607", "sec:references": [ { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743", "@id": "CVE-2016-8743", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975", "@id": "CVE-2016-4975", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743", "@id": "CVE-2016-8743", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "@id": "CVE-2016-4975", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/19.html", "@id": "CWE-19", "@title": "Data Handling(CWE-19)" } ], "title": "Vulnerability in Cosminexus HTTP Server and Hitachi Web Server" }
jvndb-2023-003771
Vulnerability from jvndb
Published
2023-10-04 15:23
Modified
2023-10-04 15:23
Severity ?
Summary
File and Directory Permissions Vulnerability in JP1/Performance Management
Details
A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management.
References
▼ | Type | URL |
---|---|---|
CVE | https://www.cve.org/CVERecord?id=CVE-2023-3440 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2023-3440 | |
No Mapping(CWE-noinfo) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html", "dc:date": "2023-10-04T15:23+09:00", "dcterms:issued": "2023-10-04T15:23+09:00", "dcterms:modified": "2023-10-04T15:23+09:00", "description": "A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:tuning_manager", "@product": "Hitachi Tuning Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "8.4", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2023-003771", "sec:references": [ { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-3440", "@id": "CVE-2023-3440", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-3440", "@id": "CVE-2023-3440", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" } ], "title": "File and Directory Permissions Vulnerability in JP1/Performance Management" }
jvndb-2020-002278
Vulnerability from jvndb
Published
2020-03-11 14:16
Modified
2020-03-11 14:16
Summary
Cross-site Scripting Vulnerability in JP1/Performance Management - Manager [Web Console]
Details
A Cross-site Scripting Vulnerability was found in JP1/Performance Management - Manager [Web Console].
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi, Ltd | JP1/Performance Management |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002278.html", "dc:date": "2020-03-11T14:16+09:00", "dcterms:issued": "2020-03-11T14:16+09:00", "dcterms:modified": "2020-03-11T14:16+09:00", "description": "A Cross-site Scripting Vulnerability was found in JP1/Performance Management - Manager [Web Console].", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002278.html", "sec:cpe": { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, "sec:identifier": "JVNDB-2020-002278", "sec:references": { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" }, "title": "Cross-site Scripting Vulnerability in JP1/Performance Management - Manager [Web Console]" }
jvndb-2014-002800
Vulnerability from jvndb
Published
2014-06-12 11:43
Modified
2015-03-03 16:59
Summary
Multiple Vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option
Details
Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option contains cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities can not be exploited, unless logging in these products.
References
▼ | Type | URL |
---|---|---|
CVE | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4188 | |
CVE | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4189 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4188 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4189 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-002800.html", "dc:date": "2015-03-03T16:59+09:00", "dcterms:issued": "2014-06-12T11:43+09:00", "dcterms:modified": "2015-03-03T16:59+09:00", "description": "Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option contains cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.\r\n\r\nThese vulnerabilities can not be exploited, unless logging in these products.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-002800.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:tuning_manager", "@product": "Hitachi Tuning Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-002800", "sec:references": [ { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4188", "@id": "CVE-2014-4188", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4189", "@id": "CVE-2014-4189", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4188", "@id": "CVE-2014-4188", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4189", "@id": "CVE-2014-4189", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple Vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management - Manager Web Option" }
jvndb-2006-000983
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Summary
JP1 Request Handling Denial of Service Vulnerabilities
Details
Hitachi JP1 products fails to handle unexpected requests and data, which could be exploited to cause a denial of service condition.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000983.html", "dc:date": "2008-05-21T00:00+09:00", "dcterms:issued": "2008-05-21T00:00+09:00", "dcterms:modified": "2008-05-21T00:00+09:00", "description": "Hitachi JP1 products fails to handle unexpected requests and data, which could be exploited to cause a denial of service condition.", "link": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000983.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:cm2_network_node_manager", "@product": "Cm2/Network Node Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_2", "@product": "Job Management Partner 1/Automatic Job Management System 2", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_base", "@product": "Job Management Partner 1/Base", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_2", "@product": "JP1/Automatic Job Management System 2", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_base", "@product": "JP1/Base", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_cm2_extensible_agent", "@product": "JP1/Cm2/Extensible Agent", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_cm2_hierarchical_agent", "@product": "JP1/Cm2/Hierarchical Agent", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_cm2_network_node_manager", "@product": "JP1/Cm2/Network Node Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_cm2_operations_assist", "@product": "JP1/Cm2/Operations Assist", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_cm2_submanager", "@product": "JP1/Cm2/SubManager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_file_access_control", "@product": "JP1/File Access Control", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_pfm_snmp_system_observer", "@product": "JP1/PFM/SNMP System Observer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_security_integrated_manager", "@product": "JP1/Security Integrated Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_serverconductor_blade_server_manager", "@product": "JP1/ServerConductor/Blade Server Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_serverconductor_deployment_manager", "@product": "JP1/ServerConductor/Deployment Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_serverconductor_server_manager", "@product": "JP1/ServerConductor/Server Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_server_system_observer", "@product": "JP1/Server System Observer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:serverconductor_blade_server_manager", "@product": "ServerConductor/Blade Server Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:serverconductor_deployment_manager", "@product": "ServerConductor/Deployment Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:serverconductor_server_manager", "@product": "ServerConductor/Server Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:system_manager", "@product": "System Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2006-000983", "sec:references": [ { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2068", "@id": "CVE-2006-2068", "@source": "CVE" }, { "#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-2068", "@id": "CVE-2006-2068", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/19841", "@id": "SA19841", "@source": "SECUNIA" }, { "#text": "http://www.securityfocus.com/bid/17706", "@id": "17706", "@source": "BID" }, { "#text": "http://xforce.iss.net/xforce/xfdb/26087", "@id": "26087", "@source": "XF" }, { "#text": "http://www.frsirt.com/english/advisories/2006/1524", "@id": "FrSIRT/ADV-2006-1524", "@source": "FRSIRT" } ], "title": "JP1 Request Handling Denial of Service Vulnerabilities" }
jvndb-2011-001928
Vulnerability from jvndb
Published
2011-08-09 10:11
Modified
2011-08-09 10:11
Summary
JP1/Performance Management - Web Console Cross-Site Scripting Vulnerability
Details
JP1/Performance Management - Web Console contains a cross-site scripting vulnerability.
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi, Ltd | JP1/Performance Management |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-001928.html", "dc:date": "2011-08-09T10:11+09:00", "dcterms:issued": "2011-08-09T10:11+09:00", "dcterms:modified": "2011-08-09T10:11+09:00", "description": "JP1/Performance Management - Web Console contains a cross-site scripting vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-001928.html", "sec:cpe": { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-001928", "sec:references": { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" }, "title": "JP1/Performance Management - Web Console Cross-Site Scripting Vulnerability" }
jvndb-2013-001605
Vulnerability from jvndb
Published
2013-02-22 20:09
Modified
2013-02-22 20:09
Summary
Multiple vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management
Details
Hitachi Tuning Manager, JP1/Performance Management - Web Console, and JP1/Performance Management - Manager Web Option contain Cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities can not be exploited, unless logging in these products.
References
▼ | Type | URL |
---|---|---|
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-001605.html", "dc:date": "2013-02-22T20:09+09:00", "dcterms:issued": "2013-02-22T20:09+09:00", "dcterms:modified": "2013-02-22T20:09+09:00", "description": "Hitachi Tuning Manager, JP1/Performance Management - Web Console, and JP1/Performance Management - Manager Web Option contain Cross-site scripting and cross-site request forgery (CSRF) vulnerabilities.\r\n\r\nThese vulnerabilities can not be exploited, unless logging in these products.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-001605.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console", "@product": "Job Management Partner 1/Performance Management - Web Console", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:tuning_manager", "@product": "Hitachi Tuning Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "9.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-001605", "sec:references": [ { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management" }
jvndb-2017-006769
Vulnerability from jvndb
Published
2017-09-04 12:14
Modified
2017-09-05 10:46
Severity ?
Summary
Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director
Details
A vulnerability to denial-of-service attacks was found in JP1 and Hitachi IT Operations Director.
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-006769.html", "dc:date": "2017-09-05T10:46+09:00", "dcterms:issued": "2017-09-04T12:14+09:00", "dcterms:modified": "2017-09-05T10:46+09:00", "description": "A vulnerability to denial-of-service attacks was found in JP1 and Hitachi IT Operations Director.", "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-006769.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:it_operations_director", "@product": "Hitachi IT Operations Director", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management", "@product": "Job Management Partner 1/IT Desktop Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager", "@product": "Job Management Partner 1/IT Desktop Management - Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_asset_information_manager", "@product": "Job Management Partner 1/Asset Information Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_2", "@product": "Job Management Partner 1/Automatic Job Management System 2", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_automatic_job_management_system_3", "@product": "Job Management Partner 1/Automatic Job Management System 3", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_integrated_management", "@product": "Job Management Partner 1/Integrated Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_it_service_level_management", "@product": "Job Management Partner 1/IT Service Level Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:job_management_partner_1_software_distribution_manager", "@product": "Job Management Partner 1/Software Distribution Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fautomatic_operation", "@product": "JP1/Automatic Operation", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager", "@product": "JP1/IT Desktop Management - Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_2", "@product": "JP1/Automatic Job Management System 2", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_3", "@product": "JP1/Automatic Job Management System 3", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_integrated_management", "@product": "JP1/Integrated Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_integrated_manager", "@product": "JP1/Integrated Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_it_desktop_management", "@product": "JP1/IT Desktop Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_it_service_level_management", "@product": "JP1/IT Service Level Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_netm_asset_information_manager", "@product": "JP1/NETM/Asset Information Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_netm_dm", "@product": "JP1/NETM/DM", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_operation_analytics", "@product": "JP1/Operations Analytics", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_performance_analysis", "@product": "JP1/Performance Analysis", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_serverconductor_control_manager", "@product": "JP1/ServerConductor/Control Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_service_level_management", "@product": "JP1/Service Level Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_service_support", "@product": "JP1/Service Support", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": [ { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "@version": "3.0" } ], "sec:identifier": "JVNDB-2017-006769", "sec:references": { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" }, "title": "Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director" }
jvndb-2010-001877
Vulnerability from jvndb
Published
2010-09-01 14:12
Modified
2010-09-01 14:12
Summary
Denial of Service (DoS) Vulnerability in JP1/PAM
Details
A Built-in database in JP1/Performance Analysis - Manager and JP1/Performance Management - Analysis Manager (JP1/PAM) contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.
After the process abends, the service can be restarted by rebooting JP1/PAM.
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001877.html", "dc:date": "2010-09-01T14:12+09:00", "dcterms:issued": "2010-09-01T14:12+09:00", "dcterms:modified": "2010-09-01T14:12+09:00", "description": "A Built-in database in JP1/Performance Analysis - Manager and JP1/Performance Management - Analysis Manager (JP1/PAM) contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.\r\nAfter the process abends, the service can be restarted by rebooting JP1/PAM.", "link": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001877.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:jp1%2fperformance_management", "@product": "JP1/Performance Management", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:jp1_performance_analysis", "@product": "JP1/Performance Analysis", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2010-001877", "sec:references": { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" }, "title": "Denial of Service (DoS) Vulnerability in JP1/PAM" }