mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
368 lines
15 KiB
JSON
368 lines
15 KiB
JSON
{
|
|
"id": "CVE-2009-1418",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-05-19T19:30:00.797",
|
|
"lastModified": "2017-08-17T01:30:20.427",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorComment": "Per: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065\r\n\r\n\r\n\"SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.\r\n\r\nHP System Management Homepage (SMH) before v3.0.1.73 running on Linux and Windows Server 2003, 2008.\"",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 3.0.1.73 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en HP System Management Homepage (SMH) anteriores a v3.0.1.73 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de vectores inespec\u00edficos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.0.0-68",
|
|
"matchCriteriaId": "904009FC-0506-4119-A26D-7CF3CE5EBDEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5FDEA64C-7511-4E71-8DFA-6E66531AC461"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F304AB45-8298-4426-91B3-B99ED7FF6C50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61ED0B94-3CC3-427C-A038-90C6CEF768BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECEAE287-0A13-4DB3-A36D-BD50148BE9B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8D25EAF-145F-4D96-836E-1B7C3FE53E47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA5379C7-0061-4C53-8B81-45F8063956DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD94C7BD-B398-42BF-9FB9-EB4581AF98E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBF2CB88-3E10-48BF-8D49-994A3E6014E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF1A3FCF-B0AD-45DF-96D3-09BE755F94A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D75CC6FB-FB51-42DD-B708-54A99B10F70A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73D573A1-93F3-4652-9E64-EDED09731EF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B6EF4B8-AF43-4777-9556-CA6DFF864B7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42050FEF-5456-4340-9AD1-00448E4B5E34"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96B6DA99-20FA-4622-8F1C-3086143CAE90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "849BE02B-513B-405E-A430-DF9D02C0A666"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C46B2D3D-1B9A-4AE4-BDE2-4E6C388356EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09857263-747C-40F5-9744-21FD03187CA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C78C2C5A-F788-4F25-BD19-50C76C802329"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745065",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://jvn.jp/en/jp/JVN02331156/index.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000029.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1022242",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35031",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50633",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |