2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-1036" ,
"sourceIdentifier" : "hp-security-alert@hp.com" ,
"published" : "2010-04-28T22:30:00.557" ,
"lastModified" : "2019-10-09T23:00:21.123" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting (XSS) vulnerability in HP System Insight Manager before 6.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en HP System Insight Manager anterior v6.0 permite a atacantes remotos iyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados. \r\n"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:*:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD4196A9-9F61-4D5D-88BD-B9203507673E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:*:update_1:*:*:*:*:*:*" ,
"versionEndIncluding" : "5.2" ,
"matchCriteriaId" : "37D86872-97C2-4100-9FB5-B03A16786913"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C07FE39-0025-4988-AE5B-A79A46EA6E25"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:2.5.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F2F7541-8174-4B32-AA30-F18FBB87CA38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "859C04D0-1DBF-4686-8A8C-59CEF4AA74FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.0:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "12F9B9A8-D820-4B90-8DCA-54F4DD15E87E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CD41C87-86F3-4E4E-A54F-C56C5C90C361"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.1:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4879BF5-2647-4335-91CD-BDD0B2CAF862"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D430EB3C-EF10-4E39-821B-C4CFB91FCA25"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABFA4EDE-1BF2-4E45-AB4A-23E981104ED1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "202984FE-E221-4E2E-A9A4-236D41EB7D11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "441A0127-F774-4D68-9663-94FBBD13A8F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "59AA99D8-868E-446C-8DA0-988CEAF86174"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FDB329C-240D-4D81-AF90-A005BF72517E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BFFA879-49E9-42C8-B180-4178115752A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:sp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "D24DCC30-30B3-4715-A02B-4C0667B1BFA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF4C5A74-7186-4331-B607-2A9BFD4AFAE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C627E16-44E7-4559-B0F2-25BFEE8FFAAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:systems_insight_manager:5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F1E270F-D317-45B9-A0CB-84FEB8248EA5"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=127239985506823&w=2" ,
"source" : "hp-security-alert@hp.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/39645" ,
"source" : "hp-security-alert@hp.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1023927" ,
"source" : "hp-security-alert@hp.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/39735" ,
"source" : "hp-security-alert@hp.com"
}
]
}