Free vulnerability management software
Mageni is a free, open-source, and powerful vulnerability management platform that takes the pain out of cybersecurity and vulnerability management.
Download Now
CVE-2008-0876
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Unspecified vulnerability in the SEWB3 messaging service in Hitachi SEWB3/PLATFORM and SEWB3/MI-PLATFORM 01-00 through 02-14-/A allows remote attackers to cause a denial of service (service outage) via "invalid data.".
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:hitachi:sewb3_mi-platform:01-00:*:hp-ux\(9.x\):*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-04:*:solaris:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:02-14-_a:*:solaris:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:02-14-_a:*:solaris:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-00:*:hi-ux_we2\(3050_ris |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-16-_f:*:hi-ux_we2\(30 |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-00:*:hi-ux_we2\(3050rx\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-16-_b:*:hi-ux_we2\(3050r |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-06:*:hi-ux_we2\(3050rx\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-00:*:hi-ux_we2\(3050r |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-11:*:hp-ux\(10.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-00:*:hi-ux_we2\(3050_ |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-10-_a:*:hp-ux\(9.x\): |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-17-_f:*:hp-ux\(11.x\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-16-_f:*:hp-ux\(11.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-17-_f:*:hp-ux\(11.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-06-_a:*:hi-ux_we2\(3050_ |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-16-_c:*:hp-ux\(11.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-16-_f:*:hi-ux_we2\(3050r |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-04:*:solaris:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-16-_b:*:hp-ux\(10.x\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-16-_c:*:hp-ux\(11.x\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-00:*:hi-ux_we2\(3050_sis |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-06-_a:*:hi-ux_we2\(30 |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-16-_f:*:hp-ux\(11.x\) |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-00:*:hp-ux\(9.x\):*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-16-_b:*:hp-ux\(10.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-16-_b:*:hi-ux_we2\(30 |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:02-13:*:aix:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-00:*:hi-ux_we2\(3050_ |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-10:*:aix:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-10-_a:*:hp-ux\(9.x\):*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-17:*:hp-ux\(11.x\):*: |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-06-_a:*:hi-ux_we2\(3050_ |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-06-_a:*:hi-ux_we2\(30 |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-10:*:aix:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-11:*:hp-ux\(10.x\):*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:01-17:*:hp-ux\(11.x\):*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_platform:02-13:*:aix:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:hitachi:sewb3_mi-platform:01-07:*:hi-ux_we2\(3050r |
Yes
|
- | - |
References
Ease with a few clicks your vulnerability scanning, assessment and management process
Mageni is a free and open-source vulnerability management software. Download it now.
1. Download Multipass
2. Launch a multipass instance
3. Install Mageni
1. If you don’t have it already, install Brew. Then, to install Multipass simply execute:
2. Launch a multipass instance
2. Install Mageni
1. Download the installer for Windows
2. Ensure your network is private
3. Run the installer
4. Launch a multipass instance
5. Log into the multipass instance
6. Install Mageni