{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T21:07:48.174","vulnerabilities":[{"cve":{"id":"CVE-2018-7119","sourceIdentifier":"security-alert@hpe.com","published":"2019-05-10T19:29:04.327","lastModified":"2024-11-21T04:11:40.603","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Local Disclosure of Sensitive Information vulnerability was identified in HPE NonStop Safeguard earlier than version SPR T9750L01^AIC or T9750H05^AIH, and later versions when the PASSWORD-PROMPT configuration attribute is not set to BLIND; all versions on H-series. STDSEC-STANDARD SECURITY PROD All prior versions before T6533L01^ADU or T6533H05^ADW, and later versions when the PASSWORD-PROMPT configuration attribute is not set to BLIND and all versions on H-series . Note that some commands in NonStop Safeguard and NonStop Standard Security software require username and password to be passed as command line parameters, which may lead to a local disclosure of the credentials."},{"lang":"es","value":"Se identificó una vulnerabilidad de Revelación de información local sensible en HPE NonStop Safeguard, versión anterior a SPR T9750L01^AIC o T9750H05^AIH, y en versiones posteriores cuando el atributo de configuración PASSWORD-PROMPT no está configurado en BLIND; todas las versiones en H-series. STDSEC-STANDARD SECURITY PROD Todas las versiones anteriores a T6533L01^ADU o T6533H05^ADW, y las versiones posteriores cuando el atributo de configuración PASSWORD-PROMPT no está configurado en BLIND y todas las versiones de la serie H . Tenga en cuenta que algunos comandos del software NonStop Safeguard y NonStop Standard Security requieren que el nombre de usuario y la contraseña se pasen como parámetros de línea de comandos, lo que puede causar una divulgación local de las credenciales."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L\/AC:M\/Au:N\/C:P\/I:N\/A:N","baseScore":1.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_safeguard_h_series:*:*:*:*:*:*:*:*","matchCriteriaId":"1334495B-CBA5-41A3-A3C6-235BB7388F77"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_safeguard_j_series:*:*:*:*:*:*:*:*","versionEndExcluding":"t9750h05\\^aih","matchCriteriaId":"CF4F15A0-4ADC-48C5-9C0A-4F5E443B47C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_safeguard_l_series:*:*:*:*:*:*:*:*","versionEndExcluding":"t9750l01\\^aic","matchCriteriaId":"603491A6-2BB5-4A08-B819-4FF4F8A2693A"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_standard_security_h_series:*:*:*:*:*:*:*:*","matchCriteriaId":"774EFC8D-2B4C-49A5-9885-C39009B213E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_standard_security_j_series:*:*:*:*:*:*:*:*","versionEndIncluding":"t6533h05\\^adw","matchCriteriaId":"08168B55-1A1A-49F3-83E7-D6BAFFF413B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:nonstop_standard_security_l_series:*:*:*:*:*:*:*:*","versionEndExcluding":"t6533l01\\^adu","matchCriteriaId":"85B60218-AAAB-4A6C-A1DF-0754505EA142"}]}]}],"references":[{"url":"https:\/\/support.hpe.com\/hpsc\/doc\/public\/display?docLocale=en_US&docId=emr_na-hpesbns03910en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https:\/\/support.hpe.com\/hpsc\/doc\/public\/display?docLocale=en_US&docId=emr_na-hpesbns03910en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}