Vulnerabilites related to hp - integrated_lights-out_5_firmware
Vulnerability from fkie_nvd
Published
2019-06-05 17:29
Modified
2024-11-21 04:22
Summary
A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EEFA032-2828-4A25-AA69-490AAF9B7F1E",
                     versionEndIncluding: "1.39",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEC03C5-6E25-47A3-9793-D411056F5D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43D747DD-AF47-4B5A-B9CC-20BEC97E7788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl160_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0DEA2A-F511-4111-8B33-B029E75D56BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5077B450-1E11-4338-8F76-E4257FBE9260",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl20_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A66883DD-061A-4D0A-A73B-3EF2F7273B83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl325_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E013812C-A291-4F5E-BA62-B034FA8288ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45369573-58FC-40E2-8124-08CDEAB6B6C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D074B-079C-4227-A2A5-654BB35E7DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl385_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0766C25-5149-4A02-BC12-38D21EAE2303",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl560_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D894E6C9-D248-4800-A138-CD0FE8F6B5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEBB303-F21A-47FF-9D79-5CBC90144782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D8F597A-DBF1-4CA5-9B10-990571E2A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA54BDB5-28DF-46D6-8D7D-F2F4F3B21381",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FF6A55B-05B4-4286-BF06-45D2A21EF58F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6662F50-79E8-4675-ABAB-E95C7B8A2BBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D33F488-C5DB-40A7-BCAB-4DA1A6FC0096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85739B50-AA18-4097-8EAA-3A750EE38AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl450_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2B30A8-303D-4A47-8D9A-7088F82D2BA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63301635-7C6F-4854-893C-C37B74F13511",
                     versionEndIncluding: "2.61b",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E58291DF-A83D-4EED-8CEB-DCCB636E57F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5010CA27-8B1D-43BE-A236-997E51E4B541",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67D2605F-2642-46EB-BA2C-8E33ACEC8ADA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87200D92-81D3-4FA4-BD4D-11F0DB7C1E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E5D6BA-A5C8-42B2-B347-1F3A70DCDC9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ED47EFC-2D0D-4864-A0CC-A6F29C236315",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml10_gen9:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "97685B5D-843B-4BA4-915C-A384F323A206",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D64DCBE5-8590-4F17-A86D-88B78E9E5943",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml150_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9876313-D746-4077-A188-F2024C3689F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml30_gen9:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C53512F-3577-4F64-977C-6579124DA93C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D95AA33-FD84-4766-A42A-4E44A1BC9B8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ws460c_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76D7479C-E340-4E58-A5E5-5AA7C95EE90A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C7DE17C-AC8E-4C0B-B6B1-6D2F4958E70A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2838C1A2-23B2-4063-8C16-1558FC329EEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230a_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40FCFF2E-22B6-4AE3-AE36-B57524656128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl250a_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0AA43F-DEFB-441C-84B8-85F523D600C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl730f_gen9:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C1B4FA-E67A-4EB7-A428-FF6C90F0E3B7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl740f_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CFED4E5-48AA-4133-A2A2-4D70101593A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl750f_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6890F055-67AE-4008-A687-EEAD92D892BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
      },
      {
         lang: "es",
         value: "Fue encontrada una vulnerabilidad de desbordamiento de búfer remoto en HPE Integrated Lights-Out 4 (iLO 4) anterior a versión 2.61b para servidores Gen9 e Integrated Lights-Out 5 (iLO 5) para servidores Gen10 anteriores a la versión versión 1.39.",
      },
   ],
   id: "CVE-2019-11983",
   lastModified: "2024-11-21T04:22:06.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 8.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 8.5,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 4.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-05T17:29:00.257",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-12-03 15:29
Modified
2024-11-21 04:11
Summary
A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D666092-BFB7-4661-83E4-455623142498",
                     versionEndExcluding: "1.37",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:gen_10_servers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C02D0550-99AE-4E94-A799-498FB51CA5D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de seguridad en HPE Integrated Lights-Out 5 (iLO 5) en versiones anteriores a la v1.37 podría explotarse localmente para omitir las restricciones de seguridad para las actualizaciones de firmware.",
      },
   ],
   id: "CVE-2018-7113",
   lastModified: "2024-11-21T04:11:39.947",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.7,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-12-03T15:29:00.620",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1042010",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1042010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-27 18:29
Modified
2024-11-21 04:11
Summary
A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CA4C93-C4D6-49BC-948D-7E42BC559C73",
                     versionEndExcluding: "2.60",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE38E85-0260-4E6D-AD50-37C51FF1CA9E",
                     versionEndExcluding: "1.30",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BC485A0-1B3E-4499-AF26-C832330E99BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B553E44A-A209-49CA-A914-CC1FE51D90D8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "666AAAE5-83AB-4018-891D-2FC69AE6AD65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD32E61-4FFE-4ECF-9582-B96D1513C706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5FC76C8-44FC-4BCC-95C1-0717126BBE2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFD8AB8C-D5BA-4312-9E7A-48ECB09F3C16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "306B6EC0-C471-48B6-858C-93A4A6CB976D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A16D30B-D064-4EEC-9628-7B64B63CE2CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A367F8FE-8500-4512-831A-408BB0772586",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "358CD445-B506-4EE9-A282-76A790EA4583",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9DB2958-DDCD-4ACA-B9C1-F7914622E36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A0F022-C271-4DB6-A12E-1A2357C0BFE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DEE638-BD6B-4B70-ABEE-AFD8FDA99F45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7B1F484-2258-4326-AEFA-725BD8EFE6CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30.",
      },
      {
         lang: "es",
         value: "Se ha identificado una potencial vulnerabilidad de seguridad de denegación de servicio (DoS) remoto en HPE Integrated Lights Out 4 en versiones anteriores a la v2.60 e iLO 5 para servidores Gen 10 en versiones anteriores a la v1.30.",
      },
   ],
   id: "CVE-2018-7101",
   lastModified: "2024-11-21T04:11:38.753",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-27T18:29:00.300",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041488",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041488",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-08-06 20:29
Modified
2024-11-21 04:11
Summary
A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CA4C93-C4D6-49BC-948D-7E42BC559C73",
                     versionEndExcluding: "2.60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE38E85-0260-4E6D-AD50-37C51FF1CA9E",
                     versionEndExcluding: "1.30",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.",
      },
      {
         lang: "es",
         value: "Se ha identificado una ejecución remota de código en HPE Integrated Lights-Out 4 (iLO 4) anteriores a la v2.60 y HPE Integrated Lights-Out 5 (iLO 5) anteriores a la v1.30.",
      },
   ],
   id: "CVE-2018-7078",
   lastModified: "2024-11-21T04:11:36.797",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-08-06T20:29:02.163",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041188",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041188",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-04-09 19:29
Modified
2024-11-21 04:11
Summary
A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0694839-C434-4390-ABBD-A64A4CE3773C",
                     versionEndExcluding: "1.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEC03C5-6E25-47A3-9793-D411056F5D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43D747DD-AF47-4B5A-B9CC-20BEC97E7788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl160_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0DEA2A-F511-4111-8B33-B029E75D56BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5077B450-1E11-4338-8F76-E4257FBE9260",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl20_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A66883DD-061A-4D0A-A73B-3EF2F7273B83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl325_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E013812C-A291-4F5E-BA62-B034FA8288ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45369573-58FC-40E2-8124-08CDEAB6B6C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D074B-079C-4227-A2A5-654BB35E7DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl385_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0766C25-5149-4A02-BC12-38D21EAE2303",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl560_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D894E6C9-D248-4800-A138-CD0FE8F6B5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEBB303-F21A-47FF-9D79-5CBC90144782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D8F597A-DBF1-4CA5-9B10-990571E2A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA54BDB5-28DF-46D6-8D7D-F2F4F3B21381",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml30_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFE18D61-BC0A-414F-A099-549D203C4EBE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FF6A55B-05B4-4286-BF06-45D2A21EF58F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6662F50-79E8-4675-ABAB-E95C7B8A2BBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D33F488-C5DB-40A7-BCAB-4DA1A6FC0096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85739B50-AA18-4097-8EAA-3A750EE38AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl450_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2B30A8-303D-4A47-8D9A-7088F82D2BA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.",
      },
      {
         lang: "es",
         value: "Se identificó una vulnerabilidad del tipo remote cross-site scripting en la Web User Interface de HPE iLO 5 en HPE Integrated Lights-Out 5 (iLO 5) para los servidores ProLiant Gen10 anteriores a la versión v1.40.",
      },
   ],
   id: "CVE-2018-7117",
   lastModified: "2024-11-21T04:11:40.383",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-04-09T19:29:01.633",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
      },
      {
         source: "security-alert@hpe.com",
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-12-12 13:15
Modified
2024-11-21 06:34
Summary
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.
Impacted products
Vendor Product Version
hp integrated_lights-out_5_firmware *
hp 3par_service_processor -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10 -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe storage_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_storage -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D179C62-EA44-4D6F-B4ED-B5E9C1674FC1",
                     versionEndExcluding: "2.44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:3par_service_processor:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A9EB35E-D915-4C4E-81F5-8DAC3FD2336C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9311154A-E0EF-46B3-B8D0-6ED540029684",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03743177-70D4-442B-B59F-43912385CC83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25418088-0890-401E-837C-611154B2C433",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1480B92-9A59-4675-B2DF-6DAE385927B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C25FD273-0E16-4975-985C-8BD96AE0D449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5876FB45-B037-4355-BAE9-69157FD0A402",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0C77CAF-0A18-4447-93BD-C64595475E37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08D81BA5-E5D8-4D42-8C42-A91063008359",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15D52EA-CE63-47AF-993D-265163B5B38E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD08B95A-240C-436E-91B5-2D594F6F1F07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8545248A-2943-4B8D-A295-BE7D43492BC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00B032E4-9663-4525-ACC4-217B5E266124",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8389F7F-7653-4695-91CC-DCFACC870094",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "419470B4-80EF-46BF-8DB4-6569D3E8435F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "594B767B-41AB-436A-AF2C-10185E1161F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C755817B-B074-4496-934B-A30C72A4F849",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A4A379-205A-479C-9C82-B182AEAEB8B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB32875E-11E3-443E-809C-12CCAE574570",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C24685-FEE2-494F-9806-56477E62FD1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7DE16BA-939E-4C26-B03B-439E60C7C872",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B224273-2E15-41F2-84D6-D754F6B76B49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "01181BEB-DE0B-49AA-B632-91B40046120F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "424298C0-01E2-4770-818D-25F47A801F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E7408A4-7409-4223-ABA7-C1F35E84D213",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC69BAD-3243-405F-839E-8BE9E2562205",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C386FE40-4223-4F35-A04A-84008B7A1B8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E86E62-1B51-4934-B8B6-40D920BE6192",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D82CC8E6-A017-406E-B993-4CFFEB230829",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\n\n",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de Cross-Site Scripting en Hewlett Packard Enterprise Integrated Lights-Out 5.",
      },
   ],
   id: "CVE-2021-46846",
   lastModified: "2024-11-21T06:34:47.993",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.5,
            source: "security-alert@hpe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-12-12T13:15:11.917",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04133en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04133en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-27 18:29
Modified
2024-11-21 04:11
Summary
A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E18AA81A-3F96-4F12-8BBA-A2A3282E891C",
                     versionEndExcluding: "1.35",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:gen_10_servers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C02D0550-99AE-4E94-A799-498FB51CA5D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39BA27DF-3771-436C-8812-708720508383",
                     versionEndExcluding: "1.90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5286861C-4CE8-465F-8D31-84ACCC91DA9F",
                     versionEndExcluding: "2.61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.",
      },
      {
         lang: "es",
         value: "Podría explotarse remotamente una vulnerabilidad de seguridad en HPE Integrated Lights-Out 5 (iLO 5) para servidores HPE Gen10 en versiones anteriores a la v1.35, HPE Integrated Lights-Out 4 (iLO 4) en versiones anteriores a la v2.61 y HPE Integrated Lights-Out 3 (iLO 3) en versiones anteriores a la v1.90 para ejecutar código arbitrario, lo que conduce a una divulgación de información.",
      },
   ],
   id: "CVE-2018-7105",
   lastModified: "2024-11-21T04:11:39.143",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-27T18:29:00.800",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105425",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041649",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105425",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041649",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-08-14 14:29
Modified
2024-11-21 04:11
Summary
A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39BA27DF-3771-436C-8812-708720508383",
                     versionEndExcluding: "1.90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CA4C93-C4D6-49BC-948D-7E42BC559C73",
                     versionEndExcluding: "2.60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE38E85-0260-4E6D-AD50-37C51FF1CA9E",
                     versionEndExcluding: "1.30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:moonshot_chassis_manager_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "43234882-5295-4648-BFBC-99F742104F29",
                     versionEndExcluding: "1.58",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:integrated_lights-out:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3BB462-1E25-4D84-ABC6-68F6762D719D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:moonshot_component_pack_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "433C9066-49CC-4CC1-82E7-463C613E2FD6",
                     versionEndExcluding: "2.55",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:moonshot_component_pack:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FEDD2CE-C8A2-40E5-B9A2-1CB9B2B8881D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de seguridad en HPE Integrated Lights-Out 3 en versiones anteriores a la v1.90, iLO 4 en versiones anteriores a la v2.60, iLO 5 en versiones anteriores a la v1.30, Moonshot Chassis Manager con firmware en versiones anteriores a la v1.58 y Moonshot Component Pack en versiones anteriores a la v2.55 podría explotarse de forma remota para crear una denegación de servicio (DoS).",
      },
   ],
   id: "CVE-2018-7093",
   lastModified: "2024-11-21T04:11:37.953",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-08-14T14:29:00.510",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041435",
      },
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041435",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-06-05 17:29
Modified
2024-11-21 04:22
Summary
A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EEFA032-2828-4A25-AA69-490AAF9B7F1E",
                     versionEndIncluding: "1.39",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEC03C5-6E25-47A3-9793-D411056F5D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43D747DD-AF47-4B5A-B9CC-20BEC97E7788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl160_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0DEA2A-F511-4111-8B33-B029E75D56BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5077B450-1E11-4338-8F76-E4257FBE9260",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl20_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A66883DD-061A-4D0A-A73B-3EF2F7273B83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl325_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E013812C-A291-4F5E-BA62-B034FA8288ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45369573-58FC-40E2-8124-08CDEAB6B6C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D074B-079C-4227-A2A5-654BB35E7DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl385_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0766C25-5149-4A02-BC12-38D21EAE2303",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl560_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D894E6C9-D248-4800-A138-CD0FE8F6B5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEBB303-F21A-47FF-9D79-5CBC90144782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D8F597A-DBF1-4CA5-9B10-990571E2A968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA54BDB5-28DF-46D6-8D7D-F2F4F3B21381",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FF6A55B-05B4-4286-BF06-45D2A21EF58F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6662F50-79E8-4675-ABAB-E95C7B8A2BBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D33F488-C5DB-40A7-BCAB-4DA1A6FC0096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85739B50-AA18-4097-8EAA-3A750EE38AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl450_gen10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2B30A8-303D-4A47-8D9A-7088F82D2BA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63301635-7C6F-4854-893C-C37B74F13511",
                     versionEndIncluding: "2.61b",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E58291DF-A83D-4EED-8CEB-DCCB636E57F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5010CA27-8B1D-43BE-A236-997E51E4B541",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67D2605F-2642-46EB-BA2C-8E33ACEC8ADA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87200D92-81D3-4FA4-BD4D-11F0DB7C1E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E5D6BA-A5C8-42B2-B347-1F3A70DCDC9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ED47EFC-2D0D-4864-A0CC-A6F29C236315",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml10_gen9:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "97685B5D-843B-4BA4-915C-A384F323A206",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D64DCBE5-8590-4F17-A86D-88B78E9E5943",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml150_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9876313-D746-4077-A188-F2024C3689F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml30_gen9:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C53512F-3577-4F64-977C-6579124DA93C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D95AA33-FD84-4766-A42A-4E44A1BC9B8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ws460c_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76D7479C-E340-4E58-A5E5-5AA7C95EE90A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C7DE17C-AC8E-4C0B-B6B1-6D2F4958E70A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2838C1A2-23B2-4063-8C16-1558FC329EEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230a_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40FCFF2E-22B6-4AE3-AE36-B57524656128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl250a_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0AA43F-DEFB-441C-84B8-85F523D600C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl730f_gen9:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C1B4FA-E67A-4EB7-A428-FF6C90F0E3B7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl740f_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CFED4E5-48AA-4133-A2A2-4D70101593A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl750f_gen9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6890F055-67AE-4008-A687-EEAD92D892BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
      },
      {
         lang: "es",
         value: "Fue encontrada una vulnerabilidad de tipo cross site scripting remota en HPE Integrated Lights-Out 4 (iLO 4) anterior a la versión 2.61b para servidores Gen9 e Integrated Lights-Out 5 (iLO 5) para servidores Gen10 anteriores a la versión 1.39.",
      },
   ],
   id: "CVE-2019-11982",
   lastModified: "2024-11-21T04:22:06.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.6,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-05T17:29:00.227",
   references: [
      {
         source: "security-alert@hpe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
      },
   ],
   sourceIdentifier: "security-alert@hpe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2021-46846
Vulnerability from cvelistv5
Published
2022-11-03 16:06
Modified
2024-08-04 05:17
Summary
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:17:42.707Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04133en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "HPE Integrated Lights-Out 5",
               vendor: "Hewlett Packard Enterprise (HPE)",
               versions: [
                  {
                     status: "affected",
                     version: "Prior to 2.44",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.</p>",
                  },
               ],
               value: "Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-12-12T12:11:04.548862Z",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04133en_us",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "cveClient/1.0.13",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2021-46846",
      datePublished: "2022-11-03T16:06:09.815Z",
      dateReserved: "2022-10-19T21:27:41.176Z",
      dateUpdated: "2024-08-04T05:17:42.707Z",
      requesterUserId: "520cc88b-a1c8-44f6-9154-21a4d74c769f",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7078
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 06:17
Severity ?
Summary
A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 5 (iLO 5) Version: iLO 4 earlier than version v2.60, iLO 5 earlier than version v1.30
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.478Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
               },
               {
                  name: "1041188",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041188",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 5 (iLO 5)",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "iLO 4 earlier than version v2.60, iLO 5 earlier than version v1.30",
                  },
               ],
            },
         ],
         datePublic: "2018-06-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote code execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-07T09:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
            },
            {
               name: "1041188",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041188",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7078",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 5 (iLO 5)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO 4 earlier than version v2.60, iLO 5 earlier than version v1.30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote code execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03844en_us",
                  },
                  {
                     name: "1041188",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041188",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7078",
      datePublished: "2018-08-06T20:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.478Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7093
Vulnerability from cvelistv5
Published
2018-08-14 14:00
Modified
2024-08-05 06:17
Severity ?
Summary
A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise iLO 5 for HPE Gen10 Servers, iLO 4, iLO 3, Moonshot Chassis Management Firmware, Moonshot Component Packs for HPE ProLiant m510 and m710x server cartridges Version: iLO 5 for HPE Gen10 Servers - Prior to v1.30, iLO 4 - Prior to v2.60, iLO 3 - Prior to v1.90, Moonshot Chassis Management Firmware - Prior to 1.58, Moonshot Component Packs - Prior to 2.55 for HPE ProLiant m510 and m710x server cartridges
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.590Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1041435",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041435",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "iLO 5 for HPE Gen10 Servers, iLO 4, iLO 3, Moonshot Chassis Management Firmware, Moonshot Component Packs for HPE ProLiant m510 and m710x server cartridges",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "iLO 5 for HPE Gen10 Servers - Prior to v1.30, iLO 4 - Prior to v2.60, iLO 3 - Prior to v1.90, Moonshot Chassis Management Firmware - Prior to 1.58, Moonshot Component Packs - Prior to 2.55 for HPE ProLiant m510 and m710x server cartridges",
                  },
               ],
            },
         ],
         datePublic: "2018-08-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-15T09:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               name: "1041435",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041435",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7093",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "iLO 5 for HPE Gen10 Servers, iLO 4, iLO 3, Moonshot Chassis Management Firmware, Moonshot Component Packs for HPE ProLiant m510 and m710x server cartridges",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO 5 for HPE Gen10 Servers - Prior to v1.30, iLO 4 - Prior to v2.60, iLO 3 - Prior to v1.90, Moonshot Chassis Management Firmware - Prior to 1.58, Moonshot Component Packs - Prior to 2.55 for HPE ProLiant m510 and m710x server cartridges",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1041435",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041435",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03835en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7093",
      datePublished: "2018-08-14T14:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.590Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7117
Vulnerability from cvelistv5
Published
2019-04-09 18:28
Modified
2024-08-05 06:17
Severity ?
Summary
A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.
Impacted products
Vendor Product Version
n/a HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers Version: iLO5 prior to v1.40
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.554Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "iLO5 prior to v1.40",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote cross-site scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-17T21:06:05",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7117",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO5 prior to v1.40",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote cross-site scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03907en_us",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7117",
      datePublished: "2019-04-09T18:28:18",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.554Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7113
Vulnerability from cvelistv5
Published
2018-12-03 15:00
Modified
2024-08-05 06:17
Severity ?
Summary
A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.569Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1042010",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1042010",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "iLO 5 for HPE Gen10 Servers - Prior to v1.37",
                  },
               ],
            },
         ],
         datePublic: "2018-12-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "local bypass of security restrictions",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-12-04T10:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               name: "1042010",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1042010",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7113",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO 5 for HPE Gen10 Servers - Prior to v1.37",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "local bypass of security restrictions",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1042010",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1042010",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03894en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7113",
      datePublished: "2018-12-03T15:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.569Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11982
Vulnerability from cvelistv5
Published
2019-06-05 16:35
Modified
2024-08-04 23:10
Severity ?
Summary
A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.
Impacted products
Vendor Product Version
n/a HPE iLO4 and HPE iLO5 Version: iLO4 prior to v2.61b and iLO5 prior to v1.39
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:10:29.994Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE iLO4 and HPE iLO5",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "iLO4 prior to v2.61b and iLO5 prior to v1.39",
                  },
               ],
            },
         ],
         datePublic: "2019-05-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "cross site scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-05T16:35:10",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2019-11982",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE iLO4 and HPE iLO5",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO4 prior to v2.61b and iLO5 prior to v1.39",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "cross site scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2019-11982",
      datePublished: "2019-06-05T16:35:10",
      dateReserved: "2019-05-13T00:00:00",
      dateUpdated: "2024-08-04T23:10:29.994Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7101
Vulnerability from cvelistv5
Published
2018-09-27 18:00
Modified
2024-08-05 06:17
Severity ?
Summary
A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.501Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1041488",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041488",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4)",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "iLO 4 prior to v2.26, iLO5 prior to v1.30",
                  },
               ],
            },
         ],
         datePublic: "2018-08-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-09-28T09:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               name: "1041488",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041488",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7101",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO 4 prior to v2.26, iLO5 prior to v1.30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1041488",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041488",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03875en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7101",
      datePublished: "2018-09-27T18:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.501Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11983
Vulnerability from cvelistv5
Published
2019-06-05 16:36
Modified
2024-08-04 23:10
Severity ?
Summary
A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.
Impacted products
Vendor Product Version
n/a HPE iLO4 and HPE iLO5 Version: iLO4 prior to v2.61b and iLO5 prior to v1.39
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:10:29.947Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE iLO4 and HPE iLO5",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "iLO4 prior to v2.61b and iLO5 prior to v1.39",
                  },
               ],
            },
         ],
         datePublic: "2019-05-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-05T16:36:07",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2019-11983",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE iLO4 and HPE iLO5",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "iLO4 prior to v2.61b and iLO5 prior to v1.39",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2019-11983",
      datePublished: "2019-06-05T16:36:07",
      dateReserved: "2019-05-13T00:00:00",
      dateUpdated: "2024-08-04T23:10:29.947Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7105
Vulnerability from cvelistv5
Published
2018-09-27 18:00
Modified
2024-08-05 06:17
Severity ?
Summary
A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 3 (iLO 3) Version: HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.562Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "105425",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/105425",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
               },
               {
                  name: "1041649",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041649",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 3 (iLO 3)",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90",
                  },
               ],
            },
         ],
         datePublic: "2018-09-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "remote execution of arbitrary code",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-18T17:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               name: "105425",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/105425",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
            },
            {
               name: "1041649",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041649",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7105",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 3 (iLO 3)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "remote execution of arbitrary code",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "105425",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/105425",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us",
                  },
                  {
                     name: "1041649",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041649",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7105",
      datePublished: "2018-09-27T18:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.562Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}