Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hp:service_manager:9.30:*:*:*:*:*:*:*", "matchCriteriaId": "F32B79D7-0C89-475B-B714-3CB1D7064491", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.31:*:*:*:*:*:*:*", "matchCriteriaId": "F3065EC7-1FE4-4715-BF04-09D7CB7F9C8A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.32:*:*:*:*:*:*:*", "matchCriteriaId": "05C97132-741B-4EA8-9023-CAD01A7651EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDE568ED-E354-4943-987E-35A796DCE0D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.34:*:*:*:*:*:*:*", "matchCriteriaId": "6AFCACDA-F200-4CA8-934A-DA8C89B7B4DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.35:*:*:*:*:*:*:*", "matchCriteriaId": "FB8AEB78-8437-4A12-BE8E-4876BB84D13C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.40:*:*:*:*:*:*:*", "matchCriteriaId": "32058060-DE9B-41DB-8DEF-871ED464FECB", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:service_manager:9.41:*:*:*:*:*:*:*", "matchCriteriaId": "8D9E9027-0259-4DFD-8621-2AE778EE1ABD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "HPE Service Manager 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, and 9.41 allows remote attackers to obtain sensitive information via unspecified vectors, related to the Web Client, Service Request Catalog, and Mobility components."}, {"lang": "es", "value": "HPE Service Manager 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40 y 9.41 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados, relacionado con los componentes Web Client, Service Request Catalog y Mobility."}], "id": "CVE-2016-2025", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-05-30T01:59:03.690", "references": [{"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035954"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149290"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035954"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149290"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}