fkie_cve-2011-1542
Vulnerability from fkie_nvd
Published
2011-04-29 22:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in HP Systems Insight Manager (SIM) before 6.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | systems_insight_manager | * | |
hp | systems_insight_manager | 2.5 | |
hp | systems_insight_manager | 2.5.2.0 | |
hp | systems_insight_manager | 4.0 | |
hp | systems_insight_manager | 4.0 | |
hp | systems_insight_manager | 4.1 | |
hp | systems_insight_manager | 4.1 | |
hp | systems_insight_manager | 4.2 | |
hp | systems_insight_manager | 4.2 | |
hp | systems_insight_manager | 4.2 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.0 | |
hp | systems_insight_manager | 5.1 | |
hp | systems_insight_manager | 5.2 | |
hp | systems_insight_manager | 5.2 | |
hp | systems_insight_manager | 5.3 | |
hp | systems_insight_manager | 5.3 | |
hp | systems_insight_manager | 6.0 | |
hp | systems_insight_manager | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE53EC7-E44E-4FC2-A168-37499AF01EA9", "versionEndIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C07FE39-0025-4988-AE5B-A79A46EA6E25", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:2.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F2F7541-8174-4B32-AA30-F18FBB87CA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "859C04D0-1DBF-4686-8A8C-59CEF4AA74FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "12F9B9A8-D820-4B90-8DCA-54F4DD15E87E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CD41C87-86F3-4E4E-A54F-C56C5C90C361", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "F4879BF5-2647-4335-91CD-BDD0B2CAF862", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D430EB3C-EF10-4E39-821B-C4CFB91FCA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "ABFA4EDE-1BF2-4E45-AB4A-23E981104ED1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "202984FE-E221-4E2E-A9A4-236D41EB7D11", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "441A0127-F774-4D68-9663-94FBBD13A8F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "59AA99D8-868E-446C-8DA0-988CEAF86174", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "1FDB329C-240D-4D81-AF90-A005BF72517E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "4BFFA879-49E9-42C8-B180-4178115752A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "D24DCC30-30B3-4715-A02B-4C0667B1BFA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "EF4C5A74-7186-4331-B607-2A9BFD4AFAE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C627E16-44E7-4559-B0F2-25BFEE8FFAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F1E270F-D317-45B9-A0CB-84FEB8248EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.2:update_1:*:*:*:*:*:*", "matchCriteriaId": "322BFC4C-71B1-4368-BBEE-87D67FA28E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FA15FE6E-7796-4D59-A84A-CA75F202D9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:5.3:update_1:*:*:*:*:*:*", "matchCriteriaId": "965E7633-A1EE-4292-AA6B-56B078BB1804", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "69B4CCF1-0683-4473-83B5-138C9C42C668", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:systems_insight_manager:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "28C12939-60B9-4378-B10C-9F1E2D3E1177", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in HP Systems Insight Manager (SIM) before 6.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados(XSS) en HP Systems Insight Manager (SIM) antes de v6.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-1542", "lastModified": "2024-11-21T01:26:33.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-04-29T22:55:01.153", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=130331642631603\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=130331642631603\u0026w=2" }, { "source": "hp-security-alert@hp.com", "url": "http://securityreason.com/securityalert/8234" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securityfocus.com/bid/47511" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securitytracker.com/id?1025415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=130331642631603\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=130331642631603\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8234" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025415" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.