{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T03:35:07.957","vulnerabilities":[{"cve":{"id":"CVE-2008-5717","sourceIdentifier":"cve@mitre.org","published":"2008-12-26T17:30:00.407","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Hitachi JP1/Integrated Management - Service Support 08-10 through 08-10-05, 08-11 through 08-11-03, and 08-50 through 08-50-03 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Hitachi JP1/Integrated Management - Service Support de v08-10 a v08-10-05, de v08-11 a v08-11-03 y de v08-50 a v08-50-03 en Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10:*:*:*:*:*:*:*","matchCriteriaId":"AEDBE4C4-6318-4C11-B2C5-9C2E1F04B040"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-01:*:*:*:*:*:*:*","matchCriteriaId":"E9F9F2FD-EBB6-4FF2-8B62-3CCB8D75CB40"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-02:*:*:*:*:*:*:*","matchCriteriaId":"4B711118-FECD-4D07-93B3-F0C1CC02EC62"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-03:*:*:*:*:*:*:*","matchCriteriaId":"78F9A4F2-1828-4079-A33E-407DD125B2C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-04:*:*:*:*:*:*:*","matchCriteriaId":"BC9DC5F9-BFDC-400B-8605-527DBF8C3BAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-10-05:*:*:*:*:*:*:*","matchCriteriaId":"96E96ED4-C358-4620-9A32-71FCACD63854"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11:*:*:*:*:*:*:*","matchCriteriaId":"8DFCF55F-1C6B-4A62-BA4B-CC380E5710FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-01:*:*:*:*:*:*:*","matchCriteriaId":"87E84892-8A5F-4577-A278-260E3F73EBC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-02:*:*:*:*:*:*:*","matchCriteriaId":"714C28C4-FC02-46D4-948E-745F862223DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-11-03:*:*:*:*:*:*:*","matchCriteriaId":"4209BD0D-8361-4020-93C6-1B6505D5D87C"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50:*:*:*:*:*:*:*","matchCriteriaId":"2C163E73-83BD-463E-8FB5-3FAA08CEF7B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-01:*:*:*:*:*:*:*","matchCriteriaId":"1E5C8945-0F88-46EE-ACB0-4F4DC167E012"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-02:*:*:*:*:*:*:*","matchCriteriaId":"2EFAAFD8-845B-44D7-83EC-3A3098800045"},{"vulnerable":true,"criteria":"cpe:2.3:a:hitachi:jp1_integrated_management_service_support:08-50-03:*:*:*:*:*:*:*","matchCriteriaId":"38C5C666-ABA5-4700-8A0E-A32E909E4843"}]}]}],"references":[{"url":"http://secunia.com/advisories/33193","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS08-023/index.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/32834","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33193","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS08-023/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/32834","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Fixed in the following versions:\r\n\r\nProduct name: JP1/Integrated Management - Service Support\r\n\r\nVersion(s):\r\n\r\nWindows\r\n    08-10-06 December 10, 2008\r\n    08-11-04 December 10, 2008\r\n    08-50-04 December 10, 2008\r\n    08-51 October 7, 2008"}}]}