fkie_cve-2012-2014
Vulnerability from fkie_nvd
Published
2012-06-29 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
HP System Management Homepage (SMH) before 7.1.1 does not properly validate input, which allows remote authenticated users to have an unspecified impact via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5107E0-A182-403D-A04E-3A46366825F3",
"versionEndIncluding": "7.1.0-16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
"matchCriteriaId": "5FDEA64C-7511-4E71-8DFA-6E66531AC461",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
"matchCriteriaId": "F304AB45-8298-4426-91B3-B99ED7FF6C50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
"matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
"matchCriteriaId": "61ED0B94-3CC3-427C-A038-90C6CEF768BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEAE287-0A13-4DB3-A36D-BD50148BE9B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
"matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
"matchCriteriaId": "A8D25EAF-145F-4D96-836E-1B7C3FE53E47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
"matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5379C7-0061-4C53-8B81-45F8063956DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
"matchCriteriaId": "FD94C7BD-B398-42BF-9FB9-EB4581AF98E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
"matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF2CB88-3E10-48BF-8D49-994A3E6014E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1A3FCF-B0AD-45DF-96D3-09BE755F94A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
"matchCriteriaId": "D75CC6FB-FB51-42DD-B708-54A99B10F70A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
"matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
"matchCriteriaId": "73D573A1-93F3-4652-9E64-EDED09731EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
"matchCriteriaId": "8B6EF4B8-AF43-4777-9556-CA6DFF864B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
"matchCriteriaId": "42050FEF-5456-4340-9AD1-00448E4B5E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
"matchCriteriaId": "96B6DA99-20FA-4622-8F1C-3086143CAE90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
"matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
"matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
"matchCriteriaId": "849BE02B-513B-405E-A430-DF9D02C0A666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4C655A93-EAF6-4AC5-97B6-39601457FE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C46B2D3D-1B9A-4AE4-BDE2-4E6C388356EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "50D50984-75F5-4F70-96BB-E2133E1360AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
"matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
"matchCriteriaId": "09857263-747C-40F5-9744-21FD03187CA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1487A6-D639-4CA5-9696-47E04D621AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0C8455-CAAC-463E-A0D6-D21B8FB1BE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "C78C2C5A-F788-4F25-BD19-50C76C802329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46BDF870-3717-4486-8F45-55794F3DC712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6E0634-1562-4DC4-80A1-283ED369176B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "70E1319D-7BA1-43AC-A4E2-69D2E885DE85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7C8CC2-1C1C-4813-8CEE-70F3F2AF3F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*",
"matchCriteriaId": "692B6E95-A67C-41E4-AEF7-CD4F01E802D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE5FC25-ADBE-41E9-A5F6-51BE9D451AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*",
"matchCriteriaId": "BBE1D8A2-4AE0-4D0B-8D4D-D842E74ED328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19DC0DB5-998A-4CE3-9AFE-A4009E6E755F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF6C235-1889-453D-8DBF-3A6165DEC833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*",
"matchCriteriaId": "51033974-B685-4214-B45D-5ED7DBDA95AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBED89BD-C66E-4B5B-AA6F-8F79246AE5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*",
"matchCriteriaId": "81DB7A7A-A051-40AE-A12E-A54DF6F41C7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2379BD-5FAE-4D3D-8BDF-0BD3DC3EAA41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8A4A11-24D2-4BEC-9D29-78BB72518A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B21D4B4-172C-4D00-AAC1-459F33F4D3BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C17F3CE1-D6A2-4B15-856C-8D083B32274F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7349879C-6CBE-4636-B6E7-C25955DE680B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:system_management_homepage:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2A419-3E62-4244-83D9-354755BEAA0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HP System Management Homepage (SMH) before 7.1.1 does not properly validate input, which allows remote authenticated users to have an unspecified impact via unknown vectors."
},
{
"lang": "es",
"value": "HP System Management Homepage (SMH) anteriores a 7.1.1 no valida apropiadamente la entrada, lo que permite a usuarios autenticados remotos tener un impacto sin especificar a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2012-2014",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-29T22:55:01.110",
"references": [
{
"source": "hp-security-alert@hp.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
}
],
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…