Vulnerability Details : CVE-2012-0130
HP Onboard Administrator (OA) before 3.50 allows remote attackers to obtain sensitive information via unspecified vectors.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2012-0130
Probability of exploitation activity in the next 30 days: 0.33%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-0130
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-0130
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0130
-
http://www.securitytracker.com/id?1026889
HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks - SecurityTracker
-
http://www.securityfocus.com/archive/1/522176
SecurityFocus
-
http://www.securityfocus.com/bid/52862
HP Onboard Administrator Multiple Security Vulnerabilities
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74577
HP Onboard Administrator unspecified information disclosure CVE-2012-0130 Vulnerability Report
Products affected by CVE-2012-0130
- cpe:2.3:a:hp:onboard_administrator:*:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.21:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.31:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.30:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.00:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.31:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.25:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.02:a:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.01:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.00:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.51:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.50:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.60:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.52:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.21:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.20:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.20:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.20:a:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.41:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.32:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:hp:onboard_administrator:1.01:*:*:*:*:*:*:*