Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.903020 |
Kategorie: | Web application abuses |
Titel: | HP System Management Homepage Multiple Unspecified Vulnerabilities |
Zusammenfassung: | This host is running HP System Management Homepage (SMH) and is; prone to multiple unspecified vulnerabilities. |
Beschreibung: | Summary: This host is running HP System Management Homepage (SMH) and is prone to multiple unspecified vulnerabilities. Vulnerability Insight: The flaws are due to multiple unspecified errors, which allows attackers to gain sensitive information or cause denial of service via unknown vectors. Vulnerability Impact: Successful exploitation will allow attackers to gain sensitive information or cause denial of service condition. Affected Software/OS: HP System Management Homepage (SMH) version prior to 7.0 Solution: Upgrade to HP System Management Homepage (SMH) version 7.0 or later. CVSS Score: 3.5 CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P |
Querverweis: |
BugTraq ID: 53121 Common Vulnerability Exposure (CVE) ID: CVE-2012-1993 HPdes Security Advisory: HPSBMU02764 http://www.securityfocus.com/archive/1/522374 HPdes Security Advisory: SSRT100827 http://www.securitytracker.com/id?1026925 XForce ISS Database: hp-system-homepage-priv-esc(74918) https://exchange.xforce.ibmcloud.com/vulnerabilities/74918 Common Vulnerability Exposure (CVE) ID: CVE-2012-0135 XForce ISS Database: hp-system-homepage-dos(74917) https://exchange.xforce.ibmcloud.com/vulnerabilities/74917 |
Copyright | Copyright (C) 2012 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |