cve-2021-46846
Vulnerability from cvelistv5
Published
2022-11-03 16:06
Modified
2024-08-04 05:17
Summary
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) HPE Integrated Lights-Out 5 Version: Prior to 2.44
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "HPE Integrated Lights-Out 5",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.44"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eCross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\u003c/p\u003e"
            }
          ],
          "value": "Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-12T12:11:04.548862Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "cveClient/1.0.13"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-46846",
    "datePublished": "2022-11-03T16:06:09.815Z",
    "dateReserved": "2022-10-19T21:27:41.176Z",
    "dateUpdated": "2024-08-04T05:17:42.707Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.44\", \"matchCriteriaId\": \"3D179C62-EA44-4D6F-B4ED-B5E9C1674FC1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:3par_service_processor:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A9EB35E-D915-4C4E-81F5-8DAC3FD2336C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9311154A-E0EF-46B3-B8D0-6ED540029684\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03743177-70D4-442B-B59F-43912385CC83\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25418088-0890-401E-837C-611154B2C433\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1480B92-9A59-4675-B2DF-6DAE385927B2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D5370AF-C0B8-4E75-8B01-A4239B130E9E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C25FD273-0E16-4975-985C-8BD96AE0D449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5876FB45-B037-4355-BAE9-69157FD0A402\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0C77CAF-0A18-4447-93BD-C64595475E37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08D81BA5-E5D8-4D42-8C42-A91063008359\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15D52EA-CE63-47AF-993D-265163B5B38E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93765BE7-D8C2-48C8-9ADA-A7C36B993D95\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD08B95A-240C-436E-91B5-2D594F6F1F07\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8545248A-2943-4B8D-A295-BE7D43492BC9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00B032E4-9663-4525-ACC4-217B5E266124\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8389F7F-7653-4695-91CC-DCFACC870094\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"419470B4-80EF-46BF-8DB4-6569D3E8435F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"594B767B-41AB-436A-AF2C-10185E1161F4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C755817B-B074-4496-934B-A30C72A4F849\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3A4A379-205A-479C-9C82-B182AEAEB8B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB32875E-11E3-443E-809C-12CCAE574570\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C24685-FEE2-494F-9806-56477E62FD1A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7DE16BA-939E-4C26-B03B-439E60C7C872\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B224273-2E15-41F2-84D6-D754F6B76B49\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01181BEB-DE0B-49AA-B632-91B40046120F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424298C0-01E2-4770-818D-25F47A801F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E7408A4-7409-4223-ABA7-C1F35E84D213\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBCBE981-8F98-49B2-B09D-B0187D5DF322\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC69BAD-3243-405F-839E-8BE9E2562205\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C386FE40-4223-4F35-A04A-84008B7A1B8E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3E86E62-1B51-4934-B8B6-40D920BE6192\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFC53F93-901B-40A9-BAAD-DD5A8865E824\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82CC8E6-A017-406E-B993-4CFFEB230829\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de Cross-Site Scripting en Hewlett Packard Enterprise Integrated Lights-Out 5.\"}]",
      "id": "CVE-2021-46846",
      "lastModified": "2024-11-21T06:34:47.993",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@hpe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L\", \"baseScore\": 6.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
      "published": "2022-12-12T13:15:11.917",
      "references": "[{\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@hpe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46846\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2022-12-12T13:15:11.917\",\"lastModified\":\"2024-11-21T06:34:47.993\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Cross-Site Scripting en Hewlett Packard Enterprise Integrated Lights-Out 5.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@hpe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.9,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.44\",\"matchCriteriaId\":\"3D179C62-EA44-4D6F-B4ED-B5E9C1674FC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:3par_service_processor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9EB35E-D915-4C4E-81F5-8DAC3FD2336C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9311154A-E0EF-46B3-B8D0-6ED540029684\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03743177-70D4-442B-B59F-43912385CC83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25418088-0890-401E-837C-611154B2C433\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1480B92-9A59-4675-B2DF-6DAE385927B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5370AF-C0B8-4E75-8B01-A4239B130E9E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD273-0E16-4975-985C-8BD96AE0D449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5876FB45-B037-4355-BAE9-69157FD0A402\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C77CAF-0A18-4447-93BD-C64595475E37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D81BA5-E5D8-4D42-8C42-A91063008359\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15D52EA-CE63-47AF-993D-265163B5B38E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93765BE7-D8C2-48C8-9ADA-A7C36B993D95\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08B95A-240C-436E-91B5-2D594F6F1F07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8545248A-2943-4B8D-A295-BE7D43492BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B032E4-9663-4525-ACC4-217B5E266124\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8389F7F-7653-4695-91CC-DCFACC870094\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419470B4-80EF-46BF-8DB4-6569D3E8435F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"594B767B-41AB-436A-AF2C-10185E1161F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C755817B-B074-4496-934B-A30C72A4F849\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4A379-205A-479C-9C82-B182AEAEB8B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB32875E-11E3-443E-809C-12CCAE574570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24685-FEE2-494F-9806-56477E62FD1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DE16BA-939E-4C26-B03B-439E60C7C872\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B224273-2E15-41F2-84D6-D754F6B76B49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01181BEB-DE0B-49AA-B632-91B40046120F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424298C0-01E2-4770-818D-25F47A801F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E7408A4-7409-4223-ABA7-C1F35E84D213\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCBE981-8F98-49B2-B09D-B0187D5DF322\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC69BAD-3243-405F-839E-8BE9E2562205\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386FE40-4223-4F35-A04A-84008B7A1B8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3E86E62-1B51-4934-B8B6-40D920BE6192\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC53F93-901B-40A9-BAAD-DD5A8865E824\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82CC8E6-A017-406E-B993-4CFFEB230829\"}]}]}],\"references\":[{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.