fkie_cve-2007-6194
Vulnerability from fkie_nvd
Published
2007-12-06 02:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in HP Select Identity 4.01 before 4.01.012 and 4.1x before 4.13.003 allows remote attackers to obtain unspecified access via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:select_identity:4.01:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "379151EB-7D31-461F-BB9E-4808A76CB97B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.01:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "C2CB2EAD-C6FF-473E-A908-B87CE1539606", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.01:*:solaris:*:*:*:*:*", "matchCriteriaId": "01AE2C3F-B2FF-427C-9FFF-0BF5EE9D3113", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.01:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "19FA843F-B60D-4DB9-AC3E-37F279EF8CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "9DCB17CC-2186-4023-AD2A-5EEEF0B3D89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "F51843D3-20BC-4A95-8A92-66086CDF0D66", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:solaris:*:*:*:*:*", "matchCriteriaId": "72571E5E-1FD0-4582-BC36-F063C70957BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.1:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "23E7255C-2A9C-4FB9-9A65-906E2E181AD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "60B21768-0CAC-4733-941E-C7EFB72043CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "8C441652-0252-48CC-9EF1-21C3C5FAC053", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:solaris:*:*:*:*:*", "matchCriteriaId": "6AA14E20-1B7F-421A-8A45-A9F7E4A22F53", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.2:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "75947839-146C-4F3F-80B3-85B043798F31", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "96DD208B-3AFF-401A-A3F0-BA18B3945B61", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "3327ECFE-F0B3-44D8-9A64-0E9E3DB1B7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:solaris:*:*:*:*:*", "matchCriteriaId": "BD6F7563-FDF8-4D5F-8C85-9BE8BDABC802", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.3:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "27531CFA-0F91-4CF5-914B-7616C05FB991", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "9C0D1440-EAC1-41A4-9026-C4AB98305061", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "9CE46849-BE74-48A0-813E-174515D7F164", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:solaris:*:*:*:*:*", "matchCriteriaId": "45C77ED4-99A0-422E-87F9-CCA7ED251D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.4:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "CE4A8658-938F-40FC-A58B-10F6236FAFB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "F2D1D632-93FA-4BBC-983F-070EA295BBA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "D35C6D9B-5B57-42D2-97B3-85D1DAE73178", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:solaris:*:*:*:*:*", "matchCriteriaId": "E0C0EF6E-7F19-4CF9-8C8C-76671DFCFF30", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.5:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "8AF42B2C-F7F8-44EE-B136-2A669E892FCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "4376106F-89A4-4A15-8CE1-F80F2B702080", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "37E31C70-E435-4403-AEC1-FC8F8EA44783", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.6:*:solaris:*:*:*:*:*", "matchCriteriaId": "CCFA8553-5F2F-40DA-9268-43596BC5FDAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "0E74612D-EE1D-4EC8-A153-80F92CF2EDB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "4B300809-100E-49B9-953D-F041B0F4D259", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:solaris:*:*:*:*:*", "matchCriteriaId": "11F78709-168C-49FA-A03F-33C6233B7081", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.7:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "4A73EC56-21A8-43E2-8800-B7D8E4B0E76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "6E8280B2-861A-460E-8629-AB0FFB6F3085", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "E295575E-C654-4504-84A7-C72E956800A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:solaris:*:*:*:*:*", "matchCriteriaId": "958DBA3C-DBF3-4639-86A8-DA66ACC3413B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.8:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "E7BA4AFD-7DE5-462F-906E-1744C9CD23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "899A20CC-4D15-437C-BFFA-49C7713BC066", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "8CA68689-FB24-4B7D-983F-722F39A3B545", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:solaris:*:*:*:*:*", "matchCriteriaId": "8024B405-60EB-4C16-84A8-5F607BA824C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.9:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "70D95786-77B3-49DC-B15F-631A1174E64B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "4C3F0387-AA8D-4E55-8FC9-301D642A6F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:red_hat_linux_as3:*:*:*:*:*", "matchCriteriaId": "F60FA31F-3224-4118-9E04-0DCC547FF986", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:solaris:*:*:*:*:*", "matchCriteriaId": "7E27357F-0AAF-4482-A885-54E451005AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:select_identity:4.1.10:*:windows_2003:*:*:*:*:*", "matchCriteriaId": "7D5E484F-F7E3-4154-A28E-251786CA0892", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in HP Select Identity 4.01 before 4.01.012 and 4.1x before 4.13.003 allows remote attackers to obtain unspecified access via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en HP Select Identity 4.01 anterior a 4.01.012 y 4.1x anterior a 4.13.003 permite a atacantes remotos obtener acceso no especificado mediante vectores no especificados." } ], "id": "CVE-2007-6194", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-06T02:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337" }, { "source": "cve@mitre.org", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/40143" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27924" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26694" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019037" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4093" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01293337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/40143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38840" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…