{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T21:29:27.640","vulnerabilities":[{"cve":{"id":"CVE-2017-8974","sourceIdentifier":"security-alert@hpe.com","published":"2018-02-15T22:29:09.077","lastModified":"2024-11-21T03:35:06.307","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Local Authentication Restriction Bypass vulnerability in HPE NonStop Server version L-Series: T6533L01 through T6533L01^ADN; J-Series and H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL was found."},{"lang":"es","value":"En la versión 1.0 de SAP HANA Extended Application Services, una contraseña keystore plana se escribe en un archivo de registro del sistema, lo que podría poner en peligro la confidencialidad de la comunicación SSL."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_server_software:*:*:*:*:*:*:*:*","versionStartIncluding":"t6533h02","versionEndIncluding":"t6533h04\\^adf","matchCriteriaId":"AB8E3429-4707-4147-B517-2FA1761611DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_server_software:*:*:*:*:*:*:*:*","versionStartIncluding":"t6533l01","versionEndIncluding":"t6533l01\\^adn","matchCriteriaId":"31E59888-AEC4-442C-BE32-48B71954AA93"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hp:nonstop_server:-:*:*:*:*:*:*:*","matchCriteriaId":"17C2C32B-5ABC-4679-9A99-F17829E36182"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/102530","source":"security-alert@hpe.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbns03804en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102530","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbns03804en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}