Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:01-00:*:*:*:*:*:*:*", "matchCriteriaId": "483A4791-D6D1-4B70-A00F-868FD02FD421", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:01-01:*:*:*:*:*:*:*", "matchCriteriaId": "D51CCC1E-8598-4ADF-BE05-C01550925098", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:06-00:*:*:*:*:*:*:*", "matchCriteriaId": "9FBC98F2-9204-4C8D-BAD6-E7718440F43F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:06-00-\\/a:*:*:*:*:*:*:*", "matchCriteriaId": "467C3A44-BB80-4618-B3A7-41D095D3D0C3", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-50:-:standard:*:*:*:*:*", "matchCriteriaId": "0542988B-39E2-4FE7-BAF3-E0EE3D06265A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-56-\\/f:-:standard:*:*:*:*:*", "matchCriteriaId": "7436B0CB-9888-4A06-BB5F-349155F2E089", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-00:-:standard:*:*:*:*:*", "matchCriteriaId": "1BC8411F-FD51-4499-96B6-105F26BCDF94", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-06:-:standard:*:*:*:*:*", "matchCriteriaId": "B32B8922-9700-4F5A-B2C9-583D8AC669FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-07:-:standard:*:*:*:*:*", "matchCriteriaId": "23E9FDDB-56A5-48AA-A4FA-E84634B7E723", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-09-\\/e:-:standard:*:*:*:*:*", "matchCriteriaId": "01D1DB4B-C0C3-4134-8368-A31D95BDA42B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-50:-:standard:*:*:*:*:*", "matchCriteriaId": "8DA76C85-A290-469F-9B67-954F2E7FA6AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-51:-:standard:*:*:*:*:*", "matchCriteriaId": "08B4C6CE-AC62-43A7-A986-02BC116385F6", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-70:-:standard:*:*:*:*:*", "matchCriteriaId": "536DCF50-BB3E-4558-8F7B-3E196B63F1C3", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-80-\\/a:-:standard:*:*:*:*:*", "matchCriteriaId": "3FDC4538-0B62-4C64-848C-211719D08FEB", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-52:-:enterprise:*:*:*:*:*", "matchCriteriaId": "AB770D16-A276-42DC-B279-9AD12E6CC4BD", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-56-\\/f:-:enterprise:*:*:*:*:*", "matchCriteriaId": "4A66C82B-A1B5-40FF-AD27-D6AD2CDA9DB4", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-00:-:enterprise:*:*:*:*:*", "matchCriteriaId": "3D5201C4-5136-4091-85CA-B70C1999F181", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-06:-:enterprise:*:*:*:*:*", "matchCriteriaId": "AF7CD95A-B373-471F-86BE-0E90B8445A72", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-07:-:enterprise:*:*:*:*:*", "matchCriteriaId": "EC449DDC-508F-40CB-9D81-CACF0AA4E617", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-09-\\/e:-:enterprise:*:*:*:*:*", "matchCriteriaId": "E7B9EF25-A548-497D-8514-30321FF8C1B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-50:-:enterprise:*:*:*:*:*", "matchCriteriaId": "DC3EB893-15D9-44A9-A3E2-239850920709", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-52:-:enterprise:*:*:*:*:*", "matchCriteriaId": "24BA0A61-C8ED-4B1B-A6FC-7C9791BF587A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-70:-:enterprise:*:*:*:*:*", "matchCriteriaId": "76E65663-CB11-4610-A450-2009658C997B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-80-\\/a:-:enterprise:*:*:*:*:*", "matchCriteriaId": "D8F1B2B7-5F62-4F10-9399-86DCD5F9AC3B", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-50:-:standard:*:*:*:*:*", "matchCriteriaId": "47EC9774-75D6-4051-BCA1-1FCC17AE2A62", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-55:-:standard:*:*:*:*:*", "matchCriteriaId": "0211106C-7475-42AC-B097-41E0E8F0AD73", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-57:-:standard:*:*:*:*:*", "matchCriteriaId": "58BC7948-4569-45DC-9F45-A353A1850ADA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-59:-:standard:*:*:*:*:*", "matchCriteriaId": "3DDB87EF-1EAF-4577-959F-68AE23127E11", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-50:-:enterprise:*:*:*:*:*", "matchCriteriaId": "A9FD1A84-F102-4ADB-83D2-26096361A26C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-55:-:enterprise:*:*:*:*:*", "matchCriteriaId": "FA9CA436-DA61-4951-BD81-F2CF7B0D171B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-57:-:enterprise:*:*:*:*:*", "matchCriteriaId": "77D562C6-2021-49D8-A49A-71B461849099", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-59:-:enterprise:*:*:*:*:*", "matchCriteriaId": "D5AE0C60-7290-4118-8944-9C2F67D15A26", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the Client Service for DPM in Hitachi ServerConductor / Deployment Manager 01-00, 01-01, and 06-00 through 06-00-/A; ServerConductor / Deployment Manager Standard Edition and Enterprise Edition 07-50 through 07-55, and 07-57 through 07-59; and JP1/ServerConductor/Deployment Manager Standard and Enterprise Edition 07-50 through 07-56-/F, 08-00 through 08-09-/E, 08-50 through 08-80-/A, 08-06 through 08-07, and 08-51 through 08-70; allows attackers to cause a denial of service (shutdown and reboot) via unknown vectors."}, {"lang": "es", "value": "Una vulnerabilidad no especificadda en el Servicio de cliente para el DPM en ServerConductor/Deployment Manager v01-00, v01-01 y v06-00 a v06-00-/A de Hitachi; ServerConductor/Deployment Manager Standard Edition y Enterprise Edition v07-50, v07-55 y v07-57 a v07-59; y JP1/ServerConductor/Deployment Manager Standard y Enterprise Edition v07-50 a v07-56-/F, v08-00, v08-09-/E, v08-50 a v08-80-/A, v08-06 a v08-07, y v08-51 a v08-70, permite a atacantes provocar una denegaci\u00f3n de servicio (apagado y reinicio del sistema) a trav\u00e9s de vectores desconocidos."}], "id": "CVE-2010-2625", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-07-02T20:30:01.833", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://osvdb.org/65833"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/40343"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/1635"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://osvdb.org/65833"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/40343"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/1635"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}