{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:17:44.392","vulnerabilities":[{"cve":{"id":"CVE-2010-4028","sourceIdentifier":"hp-security-alert@hp.com","published":"2010-10-28T20:00:03.280","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in LoadRunner Web Tours 9.10 in HP LoadRunner 9.1 and earlier allows remote attackers to cause a denial of service, and possibly obtain sensitive information or modify data, via unknown vectors."},{"lang":"es","value":"Vulnerabilidad no especificada en LoadRunner Web Tours v9.10 en HP LoadRunner v9.1 y anteriores permite a los atacantes remotos causar una denegación de servicio, y posiblemente obtener información sensible o modificar datos, a través de vectores desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner_web_tours:9.10:*:*:*:*:*:*:*","matchCriteriaId":"C2930314-CA86-4ABA-B56F-27FF3DD72C70"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1","matchCriteriaId":"830D72C6-86BC-40AC-A02E-DD932CBD24CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.0:*:*:*:*:*:*:*","matchCriteriaId":"30344845-9DAE-4E51-8E27-6B650A4EE126"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.02:*:*:*:*:*:*:*","matchCriteriaId":"B37BBFD8-81BE-4F9C-A0A5-0BEC7FA46A8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.5:*:*:*:*:*:*:*","matchCriteriaId":"476FC1E3-5BD5-4271-92FB-F017AD0CA5D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.6:*:*:*:*:*:*:*","matchCriteriaId":"09133BB4-E5EB-4084-BDA4-39732EC74DC2"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.8:*:*:*:*:*:*:*","matchCriteriaId":"7DD409D2-9A27-46C5-8368-D530A8155BB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:7.51:*:*:*:*:*:*:*","matchCriteriaId":"B05A91C3-0B55-4DE3-B9FD-0CCE06545360"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:8.0:*:*:*:*:*:*:*","matchCriteriaId":"C6792A07-8328-439E-BBF2-140B18A1D4E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:8.12:*:*:*:*:*:*:*","matchCriteriaId":"38BCA1BE-9D4C-4381-A2FC-36181A17787F"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:8.13:*:*:*:*:*:*:*","matchCriteriaId":"D59A2E8F-ED38-475E-9FAB-1B445C2ED141"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:8.14:*:*:*:*:*:*:*","matchCriteriaId":"6B18ACBD-11AA-4020-8D2E-B8C07DFA3D89"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:loadrunner:9.0:*:*:*:*:*:*:*","matchCriteriaId":"8348EAB4-C5F8-49C6-8671-2F1002BBF4AF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=128821242731749&w=2","source":"hp-security-alert@hp.com","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1024657","source":"hp-security-alert@hp.com"},{"url":"http://marc.info/?l=bugtraq&m=128821242731749&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1024657","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}