{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T21:13:26.131","vulnerabilities":[{"cve":{"id":"CVE-2018-7098","sourceIdentifier":"security-alert@hpe.com","published":"2018-08-14T14:29:01.197","lastModified":"2024-11-21T04:11:38.453","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow directory traversal."},{"lang":"es","value":"Se ha identificado una vulnerabilidad de seguridad en 3PAR Service Processor (SP) en versiones anteriores a la SP-4.4.0.GA-110(MU7). La vulnerabilidad podría explotarse de forma remota para permitir el salto de directorio."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.0,"impactScore":5.8}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.2.0:ga:*:*:*:*:*:*","matchCriteriaId":"013DFDDD-34AE-4B7E-8505-C6A426BE73CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.3.0:ga-17:*:*:*:*:*:*","matchCriteriaId":"28282263-71C2-4629-9DC3-4066EF36AAB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.3.0:ga-24:*:*:*:*:*:*","matchCriteriaId":"6BD8F29D-FB47-48B8-8A25-EB210EF24722"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-22:*:*:*:*:*:*","matchCriteriaId":"757A118A-5B3C-4CAC-BD64-95FB9AE279A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-30:*:*:*:*:*:*","matchCriteriaId":"ABDDF661-C5B7-4992-BAE2-E77F5694E21A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-53:*:*:*:*:*:*","matchCriteriaId":"9564797D-DD5D-4E38-85A7-D49C3C71B893"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-58:*:*:*:*:*:*","matchCriteriaId":"3F127EB2-392A-457D-8BEA-F88A9132FE77"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-86:*:*:*:*:*:*","matchCriteriaId":"553DA10C-DECF-4543-BD2C-445DB09E3EAF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:3par_service_provider:sp-4.4.0:ga-88:*:*:*:*:*:*","matchCriteriaId":"70121D92-887A-4644-B285-55AF4A11C239"}]}]}],"references":[{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03861en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03884en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03861en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03884en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}