Show plain JSON{"id": "CVE-2009-4185", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-02-05T22:30:02.327", "references": [{"url": "http://marc.info/?l=bugtraq&m=126529736830358&w=2", "source": "hp-security-alert@hp.com"}, {"url": "http://marc.info/?l=bugtraq&m=126529736830358&w=2", "source": "hp-security-alert@hp.com"}, {"url": "http://secunia.com/advisories/38341", "tags": ["Vendor Advisory"], "source": "hp-security-alert@hp.com"}, {"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr09-15", "tags": ["Exploit"], "source": "hp-security-alert@hp.com"}, {"url": "http://www.securityfocus.com/archive/1/509195/100/0/threaded", "source": "hp-security-alert@hp.com"}, {"url": "http://www.securityfocus.com/bid/38081", "source": "hp-security-alert@hp.com"}, {"url": "http://www.securitytracker.com/id?1023541", "source": "hp-security-alert@hp.com"}, {"url": "http://www.vupen.com/english/advisories/2010/0294", "tags": ["Vendor Advisory"], "source": "hp-security-alert@hp.com"}, {"url": "http://marc.info/?l=bugtraq&m=126529736830358&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=126529736830358&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/38341", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr09-15", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/509195/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/38081", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1023541", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/0294", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in proxy/smhui/getuiinfo in HP System Management Homepage (SMH) before 6.0 allows remote attackers to inject arbitrary web script or HTML via the servercert parameter."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados(XSS)en proxy/smhui/getuiinfo en HP System Management Homepage (SMH) anterior v6.0 permite a atacantes remotos inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro servercert."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBD83E8E-B1CE-4BB5-8147-2F656FD9E742", "versionEndIncluding": "3.0.2.77"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C035D5C-90ED-4259-B05C-BEF93D81F42F"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824996A5-C2CC-4FC5-8705-F6B4D69F39B6"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DBF9F0E-AA30-4E5A-B23E-DD895303245C"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA2005B3-1914-4B4B-892A-8CCC0F39EF6F"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D7DCF4F-609A-497B-A32E-3D946EC2EE07"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ECF53BE-0E3A-41F8-AFD2-29CA3F2D0C22"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43EF082-E9AB-41D3-B7AF-936B84BB6AEE"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "203163D8-15E8-4F2D-A807-7643EA0D6920"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAC9CEFE-23C2-4455-BE6F-51D26487D3DA"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D0DA8D6-3B1D-4935-855E-9431EB4BA683"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC95912B-8C95-4CA8-BDA7-76074E20E362"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3162C720-A042-48D8-A598-5CC9845C5715"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEDD728B-9E92-4EC8-BD61-6E1AE300CE35"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEEE1E4-1883-411E-A4BA-985041880439"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E3E3BC1-A986-4942-80FA-5911428F8E3B"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7038AC00-8A30-49CB-956D-715053A920D2"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F425004A-EC16-44E8-A297-21F33F802FE8"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD611329-F5D3-455D-A275-4D61429357E9"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C14DB20-E22E-466E-A3CD-C841CFDF2A6E"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8881820B-29B4-41DB-AEED-5513A347E290"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD0C8455-CAAC-463E-A0D6-D21B8FB1BE31"}, {"criteria": "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70E1319D-7BA1-43AC-A4E2-69D2E885DE85"}], "operator": "OR"}]}], "sourceIdentifier": "hp-security-alert@hp.com"}