Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:*:-:enterprise:en:*:*:*:*", "matchCriteriaId": "E5E96B97-60C3-4FCA-A85D-AA5F68F7831B", "versionEndIncluding": "08-07", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:*:-:standard:en:*:*:*:*", "matchCriteriaId": "A8F1247E-3C72-40D7-BCF2-F2F7D6F3B123", "versionEndIncluding": "08-07", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:08-06:-:enterprise:en:*:*:*:*", "matchCriteriaId": "6F55D6F5-574A-4B86-8D2F-B86B5173088E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:08-06:-:standard:en:*:*:*:*", "matchCriteriaId": "2A8203B3-A09C-4313-BE11-0E0C9986561A", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:*:-:enterprise:ja:*:*:*:*", "matchCriteriaId": "F16D3D69-9C86-43C8-9110-7387A0FDC3BB", "versionEndIncluding": "08-50-\\/b", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:*:-:standard:ja:*:*:*:*", "matchCriteriaId": "76E4CE54-1CC5-4A4F-85C4-D86179123567", "versionEndIncluding": "08-50-\\/b", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-52:-:enterprise:ja:*:*:*:*", "matchCriteriaId": "112BEB28-36B9-49AD-A786-95BBFCDFD24B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-52:-:standard:ja:*:*:*:*", "matchCriteriaId": "8F3F8588-AA42-420F-9802-E45A14D160CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-56:-:enterprise:ja:*:*:*:*", "matchCriteriaId": "1137B8CB-0B66-4ED3-8DBF-49BE3AEA4F5D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-56:-:standard:ja:*:*:*:*", "matchCriteriaId": "15940A05-56A1-444C-B728-F864DB54B792", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-56-\\/g\\(\\*2\\):-:enterprise:ja:*:*:*:*", "matchCriteriaId": "60399797-B6F8-425E-8637-36C94CC0CF99", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:07-56-\\/g\\(\\*2\\):-:standard:ja:*:*:*:*", "matchCriteriaId": "2DD38B1D-3C6E-4C0E-A54F-D2E3614DD8A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:08-00:-:enterprise:ja:*:*:*:*", "matchCriteriaId": "1C32FA86-5E9A-4D38-93CC-20CCB0E4619D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:jp1\\/serverconductor\\/deploymentmanager:08-00:-:standard:ja:*:*:*:*", "matchCriteriaId": "F325EFD6-D7AE-4782-9CD8-6AC584E8049D", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hitachi:serverconductor\\/deploymentmanager:*:-:-:ja:*:*:*:*", "matchCriteriaId": "752795DF-956B-4CD0-8F31-3778154AFF3D", "versionEndIncluding": "06-00-\\/a", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor\\/deploymentmanager:01-00:-:-:ja:*:*:*:*", "matchCriteriaId": "38C687C7-5D6C-43F7-912B-38A53A295C79", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor\\/deploymentmanager:01-01:-:-:ja:*:*:*:*", "matchCriteriaId": "A0BDD9FF-E3F8-4069-8AB5-0768D1251E2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hitachi:serverconductor\\/deploymentmanager:06-00:-:-:ja:*:*:*:*", "matchCriteriaId": "EDE8E789-253F-4229-BCA5-AC3ABBF2FAF3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in the PXE Mtftp service in Hitachi JP1/ServerConductor/DeploymentManager before 08-55 Japanese and before 08-51 English allows remote attackers to read arbitrary files via unknown vectors."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en el servicio PXE Mtftp en Hitachi JP1/ServerConductor/DeploymentManager anteriores 08-55 Japanese y anteriores a v08-51 English, permite a atacantes remotos leer ficheros locales mediante vectores desconocidos"}], "id": "CVE-2011-5217", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-10-25T17:55:03.717", "references": [{"source": "cve@mitre.org", "url": "http://osvdb.org/77739"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/47221"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-026/index.html"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026427"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71832"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/77739"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/47221"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-026/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026427"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71832"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}