{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:30:19.713","vulnerabilities":[{"cve":{"id":"CVE-2011-3849","sourceIdentifier":"cve@mitre.org","published":"2011-11-19T03:58:55.493","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in dxserver before 6279 in CA Directory 8.1 and CA Directory r12 before SP7 CR1 allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP packet."},{"lang":"es","value":"Vulnerabilidad no especificada en dxserver antes de v6279 en CA Directory v8.1 y en  CA Directory r12 antes de SP7 CR1 permite a atacantes remotos provocar una denegación de servicio (por caída del demonio) a través de un paquete SNMP diseñado."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:8.1:*:*:*:*:*:*:*","matchCriteriaId":"5DEC7313-009F-4292-AFAD-56F84AAE7CD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp1:*:*:*:*:*:*","matchCriteriaId":"F3C2ADDC-C25A-4086-AED1-F9B6DAF020B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp2:*:*:*:*:*:*","matchCriteriaId":"544F3691-F6A6-4A61-B46A-3F02B352C0C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp3:*:*:*:*:*:*","matchCriteriaId":"872F3FFE-847F-46F6-90A6-AF5F65048271"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp4:*:*:*:*:*:*","matchCriteriaId":"6E578A9E-2150-4DCD-A5F1-0995D45EBC16"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp5:*:*:*:*:*:*","matchCriteriaId":"1331D5FF-98FC-42F0-AF66-55AA420F4C88"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp6:*:*:*:*:*:*","matchCriteriaId":"BB34B6A6-A1EA-40E3-80F7-C90610F5F88F"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:directory:r12:sp7:*:*:*:*:*:*","matchCriteriaId":"06999560-C876-455F-9D79-5A32373B2E6D"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/520547/100/0/threaded","source":"cve@mitre.org"},{"url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7b286545DB-00B9-4B4C-8DE7-F00827F3CC75%7d","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/520547/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7b286545DB-00B9-4B4C-8DE7-F00827F3CC75%7d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}