{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T01:45:07.692","vulnerabilities":[{"cve":{"id":"CVE-2009-4184","sourceIdentifier":"hp-security-alert@hp.com","published":"2010-02-03T18:30:00.547","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in HP Enterprise Cluster Master Toolkit (ECMT) B.05.00 on HP-UX B.11.23 (11i v2) and HP-UX B.11.31 (11i v3) allows local users to gain access to an Oracle or Sybase database via unknown vectors."},{"lang":"es","value":"Vulnerabilidad inespecífica en HP Enterprise Cluster Master Toolkit (ECMT) B.05.00 en HP-UX B.11.23 (11i v2) y HP-UX B.11.31 (11i v3) permite a usuarios locales conseguir el acceso a las bases de datos Oracle o Sybase a través de vectores desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:C/I:C/A:N","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.1,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:enterprise_cluster_master_toolkit:b.05.00:*:*:*:*:*:*:*","matchCriteriaId":"B27AD5BD-96F7-473B-B395-D364306E19BC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:hp:hp-ux:11.11i:v2:*:*:*:*:*:*","matchCriteriaId":"27B6D1F2-1FB4-4E43-8457-5D0FEF1AD37E"},{"vulnerable":false,"criteria":"cpe:2.3:o:hp:hp-ux:11.11i:v3:*:*:*:*:*:*","matchCriteriaId":"DCD6B8FB-B76F-4F94-B831-CEB3BDF0A275"}]}]}],"references":[{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01894850","source":"hp-security-alert@hp.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/38423","source":"hp-security-alert@hp.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/38035","source":"hp-security-alert@hp.com"},{"url":"http://www.securitytracker.com/id?1023523","source":"hp-security-alert@hp.com"},{"url":"http://www.vupen.com/english/advisories/2010/0272","source":"hp-security-alert@hp.com","tags":["Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12172","source":"hp-security-alert@hp.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8305","source":"hp-security-alert@hp.com"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01894850","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/38423","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/38035","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1023523","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/0272","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12172","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8305","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}