FKIE_CVE-2010-2707
Vulnerability from fkie_nvd - Published: 2010-08-09 11:58 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on the HP ProCurve 2626 and 2650 switches before H.10.80 allows remote attackers to obtain sensitive information, modify data, and cause a denial of service via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E2BA5C-9E89-420F-9B8B-6EF0954EE6DE",
"versionEndIncluding": "h.10.74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.02:*:*:*:*:*:*:*",
"matchCriteriaId": "7524649A-64E0-4DB6-B4D8-6F47862C03A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.03:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADD4DC8-5F3E-4360-AA99-CB9EE2DE430F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.31:*:*:*:*:*:*:*",
"matchCriteriaId": "CC893FF1-87FB-428F-855C-677DBB546FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.32:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADCC2AE-0309-4148-A5D3-183492EA69ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.41:*:*:*:*:*:*:*",
"matchCriteriaId": "441201E8-C77C-4E12-ABBB-C5FC3A3AA956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.45:*:*:*:*:*:*:*",
"matchCriteriaId": "AC0F2B38-36AA-4B24-913B-6806C2B775B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.46:*:*:*:*:*:*:*",
"matchCriteriaId": "E235934F-D99B-4902-8311-B671F57F5D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.50:*:*:*:*:*:*:*",
"matchCriteriaId": "F99B2E52-7858-4D80-AFC4-83B0531C34EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.53:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A16BD-38C9-4B01-A7E4-F9DBC8085BE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.54:*:*:*:*:*:*:*",
"matchCriteriaId": "C07C81F5-9A45-4F8C-B981-BEFE1ABC7018",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.55:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6437E-0FEB-4C19-987D-804B633CD6C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.07.56:*:*:*:*:*:*:*",
"matchCriteriaId": "52F35FBC-B8FD-47A3-9C8E-EAAEC01BDC35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.53:*:*:*:*:*:*:*",
"matchCriteriaId": "68654980-0112-4163-95CB-71E24AD1A2D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.55:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0B79DA-6A74-4D19-9EDE-32309823567B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.56:*:*:*:*:*:*:*",
"matchCriteriaId": "EC44BA04-DBD2-441F-82F7-703FF1FFA29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.57:*:*:*:*:*:*:*",
"matchCriteriaId": "482D838D-71B4-4182-8221-0F127D2F4ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.58:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEF2A2C-589F-4021-BEE0-D3D9FD247AB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.59:*:*:*:*:*:*:*",
"matchCriteriaId": "157F2436-32CA-483D-9DD9-64BDD40047D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.60:*:*:*:*:*:*:*",
"matchCriteriaId": "638D7A45-BAB2-43E5-8974-F9567C835033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.61:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE4A94-4153-4759-AE60-733EBF7D30B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.62:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE1716A-5303-4E3B-88F7-7F33E5CD0678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.64:*:*:*:*:*:*:*",
"matchCriteriaId": "134A3B00-B8A8-4CB5-9221-9456A91C6001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.65:*:*:*:*:*:*:*",
"matchCriteriaId": "A94ADF11-D8B2-4D09-B457-3370B35319BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.67:*:*:*:*:*:*:*",
"matchCriteriaId": "9B77F7E2-8CA8-44D2-AB50-A2BB4DD6EFCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.69:*:*:*:*:*:*:*",
"matchCriteriaId": "56C37FE2-3BF8-4163-BBFF-B3B0160F2170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.70:*:*:*:*:*:*:*",
"matchCriteriaId": "941010FD-EE41-4D91-8258-7ADF98BD2519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.71:*:*:*:*:*:*:*",
"matchCriteriaId": "59848E3E-002C-418A-8EE1-8668A63094C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.72:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE7F4B5-3A36-42D3-B0C2-507A7BFF1642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.73:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E6DDFB-2479-47D9-A2E5-EC881420B115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.74:*:*:*:*:*:*:*",
"matchCriteriaId": "72C2F876-AD18-49F3-9138-90024D2A07C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.75:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2EC9DF-EF3D-46DA-BD47-947A2729FB40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.76:*:*:*:*:*:*:*",
"matchCriteriaId": "61A90867-B35A-444B-AACE-37483D0EC244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.77:*:*:*:*:*:*:*",
"matchCriteriaId": "CFDEF258-CED7-4BB0-8A63-87617A6763F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.78:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA0271-ABEC-4DDB-965C-90CDD4876263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.79:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA65568-0D26-49A0-8493-0A56F31BB353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.80:*:*:*:*:*:*:*",
"matchCriteriaId": "135E1EF7-7E8C-4A53-BE29-CF56D5C6D75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.81:*:*:*:*:*:*:*",
"matchCriteriaId": "9E3CEB5B-19A9-4C7F-BD78-4B47B97E3356",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.82:*:*:*:*:*:*:*",
"matchCriteriaId": "C7543D59-E065-4A57-87AD-04CADDC033BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.83:*:*:*:*:*:*:*",
"matchCriteriaId": "078A4A1F-CB24-4552-9606-69CCBE6DD275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.84:*:*:*:*:*:*:*",
"matchCriteriaId": "07E32FA4-E543-4401-A879-BE1985931A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.85:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF400B1-0258-4521-8AA4-7ABD9C4A4609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.86:*:*:*:*:*:*:*",
"matchCriteriaId": "76993CA1-0771-407D-8C8B-ADC2B91715F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.87:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1DED53-F414-4D96-812E-0251C9CC896D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.88:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2EFCB6-E48B-4D26-826F-073995C4C751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.89:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE052E0-37A3-4517-8472-D129BB1BA797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1882BCE3-BEBA-4E01-AE43-C68CD6B22727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.91:*:*:*:*:*:*:*",
"matchCriteriaId": "70F24CAC-4B51-4D2E-B98B-717EFA12A249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB54148-DA00-43EE-AF14-D351DA7F64CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.93:*:*:*:*:*:*:*",
"matchCriteriaId": "03A9D083-C240-4097-8E94-55C177CDE796",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.94:*:*:*:*:*:*:*",
"matchCriteriaId": "99EBE4F3-F21F-43C5-98FD-247D59176C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.95:*:*:*:*:*:*:*",
"matchCriteriaId": "FCBB624B-36D5-49CF-B12F-CAF4A8B1526C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.96:*:*:*:*:*:*:*",
"matchCriteriaId": "7CAAFD8F-F8BD-4A7B-9985-8443A34B8E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.97:*:*:*:*:*:*:*",
"matchCriteriaId": "C5908406-B628-477C-A92A-17C64FA330AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.98:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6D52D3-E001-4785-B179-1A6A3E69B664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.99:*:*:*:*:*:*:*",
"matchCriteriaId": "193D452A-1156-4058-8480-077AF2ABA586",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.100:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6571EB-7520-4D76-BFF7-5926A6834594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.101:*:*:*:*:*:*:*",
"matchCriteriaId": "131AAD5B-C4D8-4B78-8C1C-91FD8943428F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.102:*:*:*:*:*:*:*",
"matchCriteriaId": "7E93A34F-66D4-4ACA-BC62-48AEB0C2B010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.103:*:*:*:*:*:*:*",
"matchCriteriaId": "2351FD83-5BD2-4D5E-A68C-2A28881311F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.104:*:*:*:*:*:*:*",
"matchCriteriaId": "92F40461-14AB-4088-86AD-42D8D656B3FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.105:*:*:*:*:*:*:*",
"matchCriteriaId": "6B278AFB-003B-4EDF-91EA-187C289EF772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.106:*:*:*:*:*:*:*",
"matchCriteriaId": "9320C876-9ABB-4F45-9078-CBE16A0EEF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.107:*:*:*:*:*:*:*",
"matchCriteriaId": "249220CE-2BDD-4A50-BAFD-DF37426A401A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.108:*:*:*:*:*:*:*",
"matchCriteriaId": "0B948B7E-E187-4CEC-9EA7-FE644EC3A87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.08.109:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF6B616-137C-4269-8C86-E30740CABCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F9850A-2A40-4D12-9B8E-229A68DE7BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E39CCEC2-4006-4214-AD47-CDE2781B2514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.22:*:*:*:*:*:*:*",
"matchCriteriaId": "178796FF-FE73-4B5C-B4A7-7ED1B207BF90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.23:*:*:*:*:*:*:*",
"matchCriteriaId": "57491CB2-A72B-4039-82A1-E2BCE22AA512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F838AF64-5447-4B0D-BC81-4F66AF45390A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.25:*:*:*:*:*:*:*",
"matchCriteriaId": "A5598236-9A74-4878-BFEC-CB9B73C8D061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "54982BB3-A263-448B-91E8-70A7C1F887F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.27:*:*:*:*:*:*:*",
"matchCriteriaId": "68732F66-C69F-444D-9672-2152A386C1ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.28:*:*:*:*:*:*:*",
"matchCriteriaId": "58DA2D4C-00E2-42FA-81FA-F0B9A76BD0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.29:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4DB3B5-AB98-445D-9B39-0453D2A33DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8CA09B-753B-4813-836E-B4B594C7DF87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.31:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B969AB-CA10-4769-80F0-64233F07B143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.32:*:*:*:*:*:*:*",
"matchCriteriaId": "A18EBB91-18D5-46E1-B3DA-3F2B7576B833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.33:*:*:*:*:*:*:*",
"matchCriteriaId": "1A060D62-059A-468C-AEE4-9D201F18468A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.35:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4572A6-610F-42DC-8460-1F25A5767BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.36:*:*:*:*:*:*:*",
"matchCriteriaId": "95FB3B82-A246-4391-907D-D43A232AFBF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.37:*:*:*:*:*:*:*",
"matchCriteriaId": "2621F6DD-1684-4DAF-90B6-6561F59041DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.38:*:*:*:*:*:*:*",
"matchCriteriaId": "74C4A914-73B5-4081-BB4B-97F99978F39F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.39:*:*:*:*:*:*:*",
"matchCriteriaId": "936678D1-866D-415B-8F9D-FAD8AA0F06BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.40:*:*:*:*:*:*:*",
"matchCriteriaId": "0E84A51A-78F9-41C7-B357-9FAC960E204B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.41:*:*:*:*:*:*:*",
"matchCriteriaId": "27E73E6B-95C0-4C56-9DEE-BD900CC329FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.42:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4C2C1C-D2D9-49BE-8E31-0DB889030D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.43:*:*:*:*:*:*:*",
"matchCriteriaId": "4DC12E0F-2053-4220-A8AA-8134E7A007E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.44:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE528A9-D87B-4931-9226-6FB4A2FB338A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.45:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F3900D-B828-455D-ABEC-D219E144BCEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.46:*:*:*:*:*:*:*",
"matchCriteriaId": "25D005DF-5D05-445F-89F8-E505BAE530EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.47:*:*:*:*:*:*:*",
"matchCriteriaId": "88A8B490-BB90-4E77-AB01-49589E266FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.48:*:*:*:*:*:*:*",
"matchCriteriaId": "6E420D4B-01AC-4597-B4E6-12CA14438138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.49:*:*:*:*:*:*:*",
"matchCriteriaId": "C643195F-288C-4C86-8573-DD49E337AB97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.50:*:*:*:*:*:*:*",
"matchCriteriaId": "6053873C-11D7-4ACD-A11A-E46305D518C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.51:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E9FAFA-CC33-4E93-AD97-0B2A880B7257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA70632-7276-4B46-9381-E8D373DAB660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.53:*:*:*:*:*:*:*",
"matchCriteriaId": "94C03035-161E-4AEF-ABC0-2CA6CA8C764B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.54:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6FBA46-2607-4B37-984A-AB30548F81B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F4CD48-4FA1-45AC-BBB0-F94A466A2BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.56:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5D155D-6428-4F65-B967-076373950AB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.57:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9CE257-2A96-48D8-9AEF-3388FF2836F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.58:*:*:*:*:*:*:*",
"matchCriteriaId": "5063A84B-0745-4D16-98B2-7F5DE1C93D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.59:*:*:*:*:*:*:*",
"matchCriteriaId": "355DF68E-9FF3-45B3-BBF6-AB9F46D2DFE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.60:*:*:*:*:*:*:*",
"matchCriteriaId": "941EFB04-784F-4232-A910-2C8FA929CD8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.61:*:*:*:*:*:*:*",
"matchCriteriaId": "3B18EABD-4B8D-4A5C-8027-0A941038675B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.62:*:*:*:*:*:*:*",
"matchCriteriaId": "81367905-31B0-4677-B07B-3D8C06AE3F78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.63:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B3E49-D8A0-40CB-ABC9-E89228683605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.64:*:*:*:*:*:*:*",
"matchCriteriaId": "59412597-0707-411A-8F52-2B2673F542EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.65:*:*:*:*:*:*:*",
"matchCriteriaId": "E08C13C4-004C-4656-94CC-3BACC3431934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.66:*:*:*:*:*:*:*",
"matchCriteriaId": "A7ADB104-F187-4490-ADF0-7F536ABFE672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.67:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBF64C1-BADF-4136-BE31-EE25CCBBB8EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.68:*:*:*:*:*:*:*",
"matchCriteriaId": "157D43DA-A44F-41B1-BCA9-514DA1864CDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.69:*:*:*:*:*:*:*",
"matchCriteriaId": "DADE7B3D-C859-42B2-BAA0-B46B96EBA685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.70:*:*:*:*:*:*:*",
"matchCriteriaId": "085DED96-9937-494D-8F1D-67579B92D8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.71:*:*:*:*:*:*:*",
"matchCriteriaId": "1B65CF43-BDF7-4756-B8B9-63E5D28C9FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.72:*:*:*:*:*:*:*",
"matchCriteriaId": "292136FD-45DB-4F58-9F25-EED5FC628883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:procurve_switch_software:h.10.73:*:*:*:*:*:*:*",
"matchCriteriaId": "EFABA9F3-38C9-40A6-8A87-0FBA167B1D50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:procurve_switch_2626:*:*:*:*:*:*:*:*",
"matchCriteriaId": "055391CE-7595-4558-B204-8320C3EACC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:procurve_switch_2626-pwr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDDF9A01-E7FD-47A7-9562-B71B12DC7560",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:procurve_switch_2650:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28B0985D-3B36-4922-9677-AC692A45ADAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:procurve_switch_2650-pwr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63745F8C-2A53-4BC1-B559-7E68370ED703",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability on the HP ProCurve 2626 and 2650 switches before H.10.80 allows remote attackers to obtain sensitive information, modify data, and cause a denial of service via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en los switchs \r\nHP ProCurve 2626 y 2650 anteriores a vH.10.80 , permite a atacantes remotos obtener informaci\u00f3n sensible, modificar datos y provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos."
}
],
"evaluatorImpact": "Per: http://secunia.com/advisories/40865\r\n\r\n\u0027From local network\u0027",
"id": "CVE-2010-2707",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-08-09T11:58:16.520",
"references": [
{
"source": "hp-security-alert@hp.com",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02436047"
},
{
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02436047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40865"
}
],
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…