Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_00:*:*:*:*:*:*:*", "matchCriteriaId": "082BE494-064A-48E7-8C63-1033D8307376", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10:*:*:*:*:*:*:*", "matchCriteriaId": "66CFD96F-3A15-447D-B52F-CB4D024DF7AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_01:*:*:*:*:*:*:*", "matchCriteriaId": "203C2D9D-90B8-43D4-875E-4362BE652072", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_02:*:*:*:*:*:*:*", "matchCriteriaId": "5E1C5F96-DD46-4D87-B60A-994D1004D43A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_03:*:*:*:*:*:*:*", "matchCriteriaId": "43A37DF9-044B-48BF-AB67-25B47A7C8B29", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_04:*:*:*:*:*:*:*", "matchCriteriaId": "7C927356-D6AE-4042-A82C-1815DE113748", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_10_05:*:*:*:*:*:*:*", "matchCriteriaId": "7D8AB9EB-62CF-47E3-96F2-6A878AAF8C96", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50:*:*:*:*:*:*:*", "matchCriteriaId": "4F30CDA4-1EDF-4271-988C-2A4364BE3317", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50_01:*:*:*:*:*:*:*", "matchCriteriaId": "71C825A7-BD7D-4BAB-BCA4-6CDE64EEC0EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_50_02:*:*:*:*:*:*:*", "matchCriteriaId": "F83178C7-58E7-4425-A995-9036DF6409DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_device_manager:05_60:*:*:*:*:*:*:*", "matchCriteriaId": "BBFF5989-75DD-4538-84E2-88BE0B8B7607", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_00:*:*:*:*:*:*:*", "matchCriteriaId": "75E70110-718D-4D1A-852D-D1B0BFEA4E04", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_10:*:*:*:*:*:*:*", "matchCriteriaId": "AE64D18C-A55A-4872-8984-B590341029EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_20:*:*:*:*:*:*:*", "matchCriteriaId": "49B9796E-B0BF-4043-A9C1-612B680BDDD2", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_30:*:*:*:*:*:*:*", "matchCriteriaId": "4CD4EB51-7571-4080-A402-22792D832CAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_40:*:*:*:*:*:*:*", "matchCriteriaId": "B20880A3-1903-4EA3-A9C4-B94F6CFFF5D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_50:*:*:*:*:*:*:*", "matchCriteriaId": "BD6EE5E1-E0F0-49F4-8E41-EB282813C228", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_global_link_availability_manager:05_60:*:*:*:*:*:*:*", "matchCriteriaId": "4E24DA4D-4413-4ACD-A04A-F31E62DE6F22", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:04_00:*:windows:*:*:*:*:*", "matchCriteriaId": "907A0E2B-FC9D-4D2B-93B6-907702F20C12", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_00:*:windows:*:*:*:*:*", "matchCriteriaId": "BA0D6A62-AFF7-4366-8305-8E7B96F64A38", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_10:*:*:*:*:*:*:*", "matchCriteriaId": "BD9A1108-965D-4C37-A426-01DAABDBD42D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_20:*:*:*:*:*:*:*", "matchCriteriaId": "61B6418B-D016-4FA3-9A6F-832F46241F40", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_30:*:*:*:*:*:*:*", "matchCriteriaId": "DB22B0B9-F66D-4ACB-9334-E97C2EEA11C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_40:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC8995-669F-4453-B38A-DB66F85595F3", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50:*:windows:*:*:*:*:*", "matchCriteriaId": "F9CD01AA-1EAA-4EBB-A8A7-949DD1E00B65", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50_01:*:*:*:*:*:*:*", "matchCriteriaId": "A289BBCA-F14A-4CCC-B89B-BB50FD142261", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_50_02:*:*:*:*:*:*:*", "matchCriteriaId": "11F4B284-B3C3-4BDD-9A00-F0A1B503492E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_replication_monitor:05_60:*:*:*:*:*:*:*", "matchCriteriaId": "1E06BF10-2A5A-431D-A0AB-07276961C74E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:04_00:*:solaris:*:*:*:*:*", "matchCriteriaId": "FDC1DB73-7C90-4278-8226-FB0FA9C36011", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_00:*:solaris:*:*:*:*:*", "matchCriteriaId": "5F0C1855-BFF1-43A7-8F9A-7177E544D389", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_10:*:*:*:*:*:*:*", "matchCriteriaId": "D2F65701-76C9-4F30-961B-5784DF5976A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_20:*:*:*:*:*:*:*", "matchCriteriaId": "2FF26678-8214-43D3-A489-F3E3EA55CC80", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_30:*:*:*:*:*:*:*", "matchCriteriaId": "39C52083-7DD6-421A-8E15-19586DD6771F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_40:*:*:*:*:*:*:*", "matchCriteriaId": "47FD52B2-8EE3-42FE-8A4B-CB8BC1411C8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50:*:windows:*:*:*:*:*", "matchCriteriaId": "AA150DEE-1A32-4510-A205-BC6F729A6FA8", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50_01:*:*:*:*:*:*:*", "matchCriteriaId": "1422A330-9488-4774-85C9-6DBD5DB748A9", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tiered_storage_manager:05_50_02:*:*:*:*:*:*:*", "matchCriteriaId": "16FB119D-A909-4A6C-8D1A-E52DC9E5E30D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:04_00:*:*:*:*:*:*:*", "matchCriteriaId": "84A9B9AF-6955-49D2-BD8E-5D731777B332", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_00:*:*:*:*:*:*:*", "matchCriteriaId": "9D17FB3F-2EE9-411B-922A-1B9AB683F021", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_10:*:*:*:*:*:*:*", "matchCriteriaId": "063D2B7D-B809-4C66-B51F-DBC9064FAC4B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_20:*:*:*:*:*:*:*", "matchCriteriaId": "25BF7E13-2CC5-4B7D-9D53-BA166B86B6EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_30:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C266C-1A1B-4F0F-8418-BD9EE8249051", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_40:*:*:*:*:*:*:*", "matchCriteriaId": "08B03D95-1225-49CE-A66B-FF9C386106DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1-hicommand_tuning_manager:05_50:*:*:*:*:*:*:*", "matchCriteriaId": "B2F54E96-35D7-4083-B96B-46156FC937CE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Hitachi JP1/HiCommand DeviceManager, Global Link Availability Manager, Replication Monitor, Tiered Storage Manager, and Tuning Manager allows local users to obtain authentication information via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad sin especificar en el Hitachi JP1/HiCommand DeviceManager, Global Link Availability Manager, Replication Monitor, Tiered Storage Manager y Tuning Manager permite a usuarios locales obtener la informaci\u00f3n de la autenticaci\u00f3n mediante vectores sin especificar."}], "id": "CVE-2007-1853", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2007-04-03T16:19:00.000", "references": [{"source": "cve@mitre.org", "url": "http://osvdb.org/34590"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/24684"}, {"source": "cve@mitre.org", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-007_e/index-e.html"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23210"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1169"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33328"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34590"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/24684"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-007_e/index-e.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23210"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1169"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33328"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}