fkie_cve-2010-3284
Vulnerability from fkie_nvd
Published
2010-09-24 19:00
Modified
2024-11-21 01:18
Severity ?
Summary
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to obtain sensitive information via unknown vectors.
Impacted products
Vendor Product Version
hp system_management_homepage *
hp system_management_homepage 2.0.0
hp system_management_homepage 2.0.1
hp system_management_homepage 2.0.1.104
hp system_management_homepage 2.0.2
hp system_management_homepage 2.0.2.106
hp system_management_homepage 2.1
hp system_management_homepage 2.1.0-103
hp system_management_homepage 2.1.0-103\(a\)
hp system_management_homepage 2.1.0-109
hp system_management_homepage 2.1.0-118
hp system_management_homepage 2.1.0.121
hp system_management_homepage 2.1.1
hp system_management_homepage 2.1.2
hp system_management_homepage 2.1.2-127
hp system_management_homepage 2.1.2.127
hp system_management_homepage 2.1.3
hp system_management_homepage 2.1.3.132
hp system_management_homepage 2.1.4
hp system_management_homepage 2.1.4-143
hp system_management_homepage 2.1.4.143
hp system_management_homepage 2.1.5
hp system_management_homepage 2.1.5-146
hp system_management_homepage 2.1.5.146
hp system_management_homepage 2.1.5.146
hp system_management_homepage 2.1.6
hp system_management_homepage 2.1.6-156
hp system_management_homepage 2.1.6.156
hp system_management_homepage 2.1.7
hp system_management_homepage 2.1.7-168
hp system_management_homepage 2.1.7.168
hp system_management_homepage 2.1.8
hp system_management_homepage 2.1.8-177
hp system_management_homepage 2.1.8.179
hp system_management_homepage 2.1.9
hp system_management_homepage 2.1.9-178
hp system_management_homepage 2.1.10
hp system_management_homepage 2.1.10-186
hp system_management_homepage 2.1.10.186
hp system_management_homepage 2.1.10.186
hp system_management_homepage 2.1.10.186
hp system_management_homepage 2.1.11
hp system_management_homepage 2.1.11-197
hp system_management_homepage 2.1.11.197
hp system_management_homepage 2.1.12-118
hp system_management_homepage 2.1.12-200
hp system_management_homepage 2.1.12.201
hp system_management_homepage 2.1.14.20
hp system_management_homepage 2.1.14.204
hp system_management_homepage 2.1.15-210
hp system_management_homepage 2.1.15.210
hp system_management_homepage 2.2.6
hp system_management_homepage 2.2.8
hp system_management_homepage 3.0.0-68
hp system_management_homepage 3.0.0.64
hp system_management_homepage 3.0.1-73
hp system_management_homepage 3.0.1.73
hp system_management_homepage 3.0.2-77
hp system_management_homepage 3.0.2.77
hp system_management_homepage 3.0.2.77
hp system_management_homepage 6.0
hp system_management_homepage 6.0.0-95
hp system_management_homepage 6.0.0.96
hp system_management_homepage 6.1
hp system_management_homepage 6.1.0-103



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "837D0ADA-3858-468E-877A-9363CB7C9696",
              "versionEndIncluding": "6.1.0.102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FDEA64C-7511-4E71-8DFA-6E66531AC461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "F304AB45-8298-4426-91B3-B99ED7FF6C50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
              "matchCriteriaId": "61ED0B94-3CC3-427C-A038-90C6CEF768BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECEAE287-0A13-4DB3-A36D-BD50148BE9B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
              "matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D25EAF-145F-4D96-836E-1B7C3FE53E47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
              "matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5379C7-0061-4C53-8B81-45F8063956DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
              "matchCriteriaId": "FD94C7BD-B398-42BF-9FB9-EB4581AF98E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
              "matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF2CB88-3E10-48BF-8D49-994A3E6014E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1A3FCF-B0AD-45DF-96D3-09BE755F94A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75CC6FB-FB51-42DD-B708-54A99B10F70A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D573A1-93F3-4652-9E64-EDED09731EF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
              "matchCriteriaId": "8B6EF4B8-AF43-4777-9556-CA6DFF864B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
              "matchCriteriaId": "42050FEF-5456-4340-9AD1-00448E4B5E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
              "matchCriteriaId": "96B6DA99-20FA-4622-8F1C-3086143CAE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
              "matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
              "matchCriteriaId": "849BE02B-513B-405E-A430-DF9D02C0A666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46B2D3D-1B9A-4AE4-BDE2-4E6C388356EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E380736-DB0E-4A1A-AD08-0E1ACD3AC139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "09857263-747C-40F5-9744-21FD03187CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0C8455-CAAC-463E-A0D6-D21B8FB1BE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78C2C5A-F788-4F25-BD19-50C76C802329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F6E0634-1562-4DC4-80A1-283ED369176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E1319D-7BA1-43AC-A4E2-69D2E885DE85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*",
              "matchCriteriaId": "692B6E95-A67C-41E4-AEF7-CD4F01E802D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE5FC25-ADBE-41E9-A5F6-51BE9D451AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*",
              "matchCriteriaId": "BBE1D8A2-4AE0-4D0B-8D4D-D842E74ED328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "19DC0DB5-998A-4CE3-9AFE-A4009E6E755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF6C235-1889-453D-8DBF-3A6165DEC833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "51033974-B685-4214-B45D-5ED7DBDA95AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBED89BD-C66E-4B5B-AA6F-8F79246AE5DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DB7A7A-A051-40AE-A12E-A54DF6F41C7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to obtain sensitive information via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en HP System Management Homepage (SMH) en versiones anteriores a la v6.2 permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2010-3284",
  "lastModified": "2024-11-21T01:18:26.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-09-24T19:00:04.857",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.