fkie_cve-2010-3284
Vulnerability from fkie_nvd
Published
2010-09-24 19:00
Modified
2024-11-21 01:18
Severity ?
Summary
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to obtain sensitive information via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "837D0ADA-3858-468E-877A-9363CB7C9696", "versionEndIncluding": "6.1.0.102", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*", "matchCriteriaId": "5FDEA64C-7511-4E71-8DFA-6E66531AC461", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*", "matchCriteriaId": "F304AB45-8298-4426-91B3-B99ED7FF6C50", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*", "matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*", "matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*", "matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*", "matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*", "matchCriteriaId": "61ED0B94-3CC3-427C-A038-90C6CEF768BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*", "matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*", "matchCriteriaId": "ECEAE287-0A13-4DB3-A36D-BD50148BE9B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*", "matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*", "matchCriteriaId": "A8D25EAF-145F-4D96-836E-1B7C3FE53E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*", "matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*", "matchCriteriaId": "AA5379C7-0061-4C53-8B81-45F8063956DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*", "matchCriteriaId": "FD94C7BD-B398-42BF-9FB9-EB4581AF98E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*", "matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*", "matchCriteriaId": "EBF2CB88-3E10-48BF-8D49-994A3E6014E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*", "matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*", "matchCriteriaId": "BF1A3FCF-B0AD-45DF-96D3-09BE755F94A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*", "matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*", "matchCriteriaId": "D75CC6FB-FB51-42DD-B708-54A99B10F70A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*", "matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*", "matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*", "matchCriteriaId": "73D573A1-93F3-4652-9E64-EDED09731EF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*", "matchCriteriaId": "8B6EF4B8-AF43-4777-9556-CA6DFF864B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*", "matchCriteriaId": "42050FEF-5456-4340-9AD1-00448E4B5E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*", "matchCriteriaId": "96B6DA99-20FA-4622-8F1C-3086143CAE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*", "matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*", "matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*", "matchCriteriaId": "849BE02B-513B-405E-A430-DF9D02C0A666", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*", "matchCriteriaId": "C46B2D3D-1B9A-4AE4-BDE2-4E6C388356EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*", "matchCriteriaId": "5E380736-DB0E-4A1A-AD08-0E1ACD3AC139", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*", "matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*", "matchCriteriaId": "09857263-747C-40F5-9744-21FD03187CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*", "matchCriteriaId": "DD0C8455-CAAC-463E-A0D6-D21B8FB1BE31", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "C78C2C5A-F788-4F25-BD19-50C76C802329", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E0634-1562-4DC4-80A1-283ED369176B", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*", "matchCriteriaId": "70E1319D-7BA1-43AC-A4E2-69D2E885DE85", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*", "matchCriteriaId": "692B6E95-A67C-41E4-AEF7-CD4F01E802D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*", "matchCriteriaId": "CFE5FC25-ADBE-41E9-A5F6-51BE9D451AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*", "matchCriteriaId": "BBE1D8A2-4AE0-4D0B-8D4D-D842E74ED328", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "19DC0DB5-998A-4CE3-9AFE-A4009E6E755F", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*", "matchCriteriaId": "8CF6C235-1889-453D-8DBF-3A6165DEC833", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*", "matchCriteriaId": "51033974-B685-4214-B45D-5ED7DBDA95AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBED89BD-C66E-4B5B-AA6F-8F79246AE5DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*", "matchCriteriaId": "81DB7A7A-A051-40AE-A12E-A54DF6F41C7C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to obtain sensitive information via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en HP System Management Homepage (SMH) en versiones anteriores a la v6.2 permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de vectores de ataque desconocidos." } ], "id": "CVE-2010-3284", "lastModified": "2024-11-21T01:18:26.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-09-24T19:00:04.857", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=128525531721328\u0026w=2" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.