CVE-2007-4931
Published Sep 18, 2007
Last updated 14 years ago
Overview
- Description
- HP System Management Homepage (SMH) for Windows, when used in conjunction with HP Version Control Agent or Version Control Repository Manager, leaves old OpenSSL software active after an OpenSSL update, which has unknown impact and attack vectors, probably related to previous vulnerabilities for OpenSSL.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD9A9442-18B7-4858-AB3A-19FE272A5C61" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90042282-9151-4D8E-8093-D85E57BD332C" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3EF92B4-AAC3-4957-9D8F-1796C2045962" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D44CEFC1-CE95-4549-A981-C3F259075B77" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFA42455-F9B9-49BD-BAFA-4A02C554ECE9" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6426924C-AA5C-4C93-AB8B-9314CD010139" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6E5C789-9827-47DF-A47C-454DF7687E59" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85F0390-B076-4B54-9E4E-67472FF3759E" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29FE29FC-AD24-4C89-9AAC-9D49C54A5CC9" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20EBB25A-A1DE-4943-9EE5-0FCF21A55666" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B61485E4-6EC1-4886-AB47-F5BC8E72A08A" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E354FF4-5CDD-4B79-B56C-2C774B235D78" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3DACC6F-DCE8-4890-BE47-488CB7B2DF77" }, { "criteria": "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AFAF26C-7BFE-479E-880C-B13E78780625" } ], "operator": "OR" } ] } ]