Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2016-4391

Summary
Assigner-hpe
Assigner Org ID-eb103674-0d28-4225-80f8-39fb86215de0
Published At-06 Aug, 2018 | 20:00
Updated At-06 Aug, 2024 | 00:25
Rejected At-
Credits

A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hpe
Assigner Org ID:eb103674-0d28-4225-80f8-39fb86215de0
Published At:06 Aug, 2018 | 20:00
Updated At:06 Aug, 2024 | 00:25
Rejected At:
▼CVE Numbering Authority (CNA)

A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0.

Affected Products
Vendor
Hewlett Packard Enterprise (HPE)Hewlett Packard Enterprise
Product
HP ArcSight WINC Connector
Versions
Affected
  • all versions prior to v7.3.0
Problem Types
TypeCWE IDDescription
textN/Aremote code execution
Type: text
CWE ID: N/A
Description: remote code execution
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743
x_refsource_CONFIRM
http://www.securityfocus.com/bid/93789
vdb-entry
x_refsource_BID
http://www.securitytracker.com/id/1037068
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/93789
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securitytracker.com/id/1037068
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/93789
vdb-entry
x_refsource_BID
x_transferred
http://www.securitytracker.com/id/1037068
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/93789
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securitytracker.com/id/1037068
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-alert@hpe.com
Published At:06 Aug, 2018 | 20:29
Updated At:09 Oct, 2018 | 14:56

A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

HP Inc.
hp
>>arcsight_winc_connector>>Versions before 7.3.0(exclusive)
cpe:2.3:a:hp:arcsight_winc_connector:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/93789security-alert@hpe.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1037068security-alert@hpe.com
Third Party Advisory
VDB Entry
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743security-alert@hpe.com
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/93789
Source: security-alert@hpe.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1037068
Source: security-alert@hpe.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05313743
Source: security-alert@hpe.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1205Records found

CVE-2018-7121
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-43.84% / 97.44%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 14:09
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centerHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-287
Improper Authentication
CVE-2018-7095
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-0.77% / 72.52%
||
7 Day CHG~0.00%
Published-14 Aug, 2018 | 14:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow access restriction bypass.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-3par_service_providerHPE 3PAR Service Processors
CVE-2010-4267
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-10.22% / 92.84%
||
7 Day CHG~0.00%
Published-20 Jan, 2011 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.

Action-Not Available
Vendor-n/aHP Inc.
Product-linux_imaging_and_printing_projectn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-7076
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-20.34% / 95.31%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 13:00
Updated-16 Sep, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability was identified in HPE Intelligent Management Center (iMC) prior to iMC PLAT 7.3 E0605P04.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerHPE intelligence Management Center (iMC) PLAT
CWE ID-CWE-287
Improper Authentication
CVE-2017-5791
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-64.34% / 98.37%
||
7 Day CHG~0.00%
Published-13 Oct, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The doFilter method in UrlAccessController in HPE Intelligent Management Center (iMC) PLAT 7.2 E0403P06 allows remote bypass of authentication via unspecified strings in a URI.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_center_platHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-287
Improper Authentication
CVE-2010-3004
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-6.21% / 90.49%
||
7 Day CHG~0.00%
Published-08 Sep, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Operations Agent 7.36 and 8.6 on Windows allows remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.Microsoft Corporation
Product-operations_agentwindowsn/a
CVE-2018-5923
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.54% / 80.62%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 15:15
Updated-05 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HP LaserJet Enterprise, HP PageWide Enterprise, HP LaserJet Managed, and HP OfficeJet Enterprise Printers, solution application signature checking may allow potential execution of arbitrary code.

Action-Not Available
Vendor-HPHP Inc.
Product-color_laserjet_managed_flow_mfp_e87660zcolor_laserjet_managed_mfp_e87640dn_firmwareofficejet_enterprise_color_x555dnlaserjet_enterprise_mfp_m633fh_firmwarelaserjet_enterprise_mfp_m631dn_firmwarelaserjet_enterprise_color_flow_mfp_m575c_firmwarelaserjet_managed_mfp_e82560dn_firmwarepagewide_enterprise_color_x556dnpagewide_managed_color_e75160dncolor_laserjet_managed_mfp_e77825_firmwarecolor_laserjet_managed_mfp_e67560dhpagewide_managed_color_mfp_e77650dnlaserjet_enterprise_flow_m830z_mfpcolor_laserjet_enterprise_m652n_firmwarecolor_laserjet_enterprise_m552color_laserjet_managed_flow_mfp_e67550flaserjet_enterprise_m4555_mfp_firmwarelaserjet_enterprise_flow_mfp_m632zcolor_laserjet_enterprise_m653dnlaserjet_managed_e60075dnlaserjet_managed_flow_mfp_e62575z_firmwarepagewide_enterprise_color_x556xhcolor_laserjet_m680pagewide_enterprise_color_mfp_586flaserjet_enterprise_flow_mfp_m633z_firmwarelaserjet_managed_mfp_e72525_firmwarecolor_laserjet_enterprise_flow_mfp_m681z_firmwarelaserjet_enterprise_m608dh_firmwarecolor_laserjet_managed_mfp_e67550dh_firmwarelaserjet_managed_e60055dn_firmwarecolor_laserjet_managed_e55040dw_firmwarelaserjet_enterprise_600_m603xhlaserjet_enterprise_700_color_mfp_m775_firmwarelaserjet_enterprise_700_color_mfp_m775laserjet_managed_e60075dn_firmwarecolor_laserjet_managed_mfp_e87650_firmwarecolor_laserjet_managed_mfp_e87660dn_firmwarelaserjet_enterprise_mfp_m630_firmwarelaserjet_enterprise_m609dn_firmwarelaserjet_enterprise_m604color_laserjet_managed_mfp_e57540dn_firmwarelaserjet_enterprise_mfp_m725pagewide_managed_color_flow_mfp_e77660dn_firmwarepagewide_managed_color_flow_mfp_e77660zcolor_laserjet_enterprise_m653xlaserjet_enterprise_m607dnlaserjet_managed_flow_mfp_e52545cpagewide_managed_color_flow_mfp_e77660zspagewide_managed_color_mfp_e58650dn_firmwarelaserjet_enterprise_500_mfp_m525flaserjet_enterprise_600_m603xh_firmwarescanjet_enterprise_8500_document_capture_workstation_firmwarecolor_laserjet_managed_flow_mfp_e87660z_firmwarecolor_laserjet_managed_flow_mfp_e77822laserjet_managed_mfp_e72530color_laserjet_managed_mfp_e77825color_laserjet_enterprise_flow_mfp_m681fpagewide_managed_color_mfp_e58650dncolor_laserjet_managed_flow_mfp_e67560z_firmwarecolor_laserjet_cp5525laserjet_enterprise_m608n_firmwarelaserjet_enterprise_m608dnlaserjet_managed_e60065x_firmwarelaserjet_managed_e60075xcolor_laserjet_managed_e65060x_firmwarelaserjet_enterprise_800_color_m855officejet_enterprise_color_x555xh_firmwarelaserjet_managed_flow_mfp_e72530color_laserjet_managed_e65060xcolor_laserjet_managed_flow_mfp_e87640_firmwarecolor_laserjet_enterprise_m652npagewide_managed_color_flow_mfp_e77660dnofficejet_enterprise_color_mfp_x585_firmwarepagewide_managed_color_flow_mfp_e77650zcolor_laserjet_enterprise_flow_mfp_m681f_firmwarepagewide_enterprise_color_flow_mfp_586z_firmwarelaserjet_enterprise_mfp_m632hlaserjet_managed_mfp_e62555dn_firmwarelaserjet_managed_e50045dw_firmwarecolor_laserjet_enterprise_m553_firmwarecolor_laserjet_enterprise_m651laserjet_enterprise_500_color_mfp_m575dn_firmwarelaserjet_enterprise_m608dn_firmwarecolor_laserjet_managed_flow_mfp_e77825color_laserjet_enterprise_m653x_firmwarecolor_laserjet_enterprise_m750color_laserjet_cm4540_mfppagewide_managed_color_flow_mfp_e77650z_firmwarecolor_laserjet_cp5525_firmwarelaserjet_managed_mfp_e72530_firmwarelaserjet_managed_mfp_e82550_firmwarepagewide_enterprise_color_mpf_785f_firmwarecolor_laserjet_enterprise_mfp_m681fcolor_laserjet_managed_flow_mfp_e87650_firmwarelaserjet_enterprise_m806_firmwarecolor_laserjet_managed_flow_mfp_e77830zcolor_laserjet_enterprise_m750_firmwarecolor_laserjet_m680_firmwarelaserjet_managed_mfp_e72535dnlaserjet_managed_flow_mfp_e82550laserjet_enterprise_color_500_m551_firmwarelaserjet_managed_flow_mfp_e62555dnlaserjet_enterprise_mfp_m725_firmwarelaserjet_enterprise_600_m601_firmwarepagewide_managed_color_e55650dncolor_laserjet_managed_mfp_e67550dhpagewide_enterprise_color_mpf_780dn_firmwarecolor_laserjet_enterprise_m652dn_firmwarelaserjet_enterprise_m609dhlaserjet_enterprise_600_m602pagewide_managed_color_flow_mfp_e77660zts_firmwarelaserjet_enterprise_flow_mfp_m631hpagewide_managed_color_mfp_e77650dn_firmwarelaserjet_enterprise_m605laserjet_enterprise_m606laserjet_managed_e60065dnofficejet_enterprise_color_mfp_x585laserjet_enterprise_m605_firmwarelaserjet_enterprise_800_color_m855_firmwarecolor_laserjet_enterprise_m552_firmwarelaserjet_enterprise_mfp_m633fhcolor_laserjet_managed_e65060dn_firmwarelaserjet_managed_e50045dwpagewide_enterprise_color_mpf_785zspagewide_managed_color_flow_mfp_e77650zs_firmwarelaserjet_enterprise_m608dhdigital_sender_flow_8500_fn2_document_capture_workstation_firmwarecolor_laserjet_managed_flow_mfp_e77825_firmwarecolor_laserjet_enterprise_m653dh_firmwarelaserjet_managed_flow_mfp_e62565hcolor_laserjet_enterprise_m653dhscanjet_enterprise_flow_n9120_document_flatbed_scannercolor_laserjet_managed_flow_mfp_e57540c_firmwarelaserjet_managed_flow_mfp_e72525_firmwareofficejet_enterprise_color_flow_mfp_x585_firmwarecolor_laserjet_managed_flow_mfp_e67550f_firmwarelaserjet_managed_mfp_e62565hscolor_laserjet_managed_mfp_e77830dncolor_laserjet_managed_mfp_e77822laserjet_enterprise_mfp_m527_firmwarepagewide_managed_color_mfp_e77650dnspagewide_managed_color_flow_mfp_e58650zlaserjet_enterprise_700_m712xh_firmwarelaserjet_managed_flow_mfp_e82560z_firmwarelaserjet_enterprise_m607nlaserjet_managed_mfp_e82560dnlaserjet_enterprise_mfp_m527laserjet_enterprise_mfp_m631z_firmwarelaserjet_enterprise_mfp_m632fht_firmwarelaserjet_managed_mfp_e52545dnlaserjet_managed_e60065dn_firmwarecolor_laserjet_enterprise_mfp_m681dh_firmwarelaserjet_enterprise_flow_mfp_m632z_firmwarepagewide_managed_color_mfp_e77650dns_firmwarepagewide_managed_color_e55650dn_firmwarecolor_laserjet_cm4540_mfp_firmwarepagewide_enterprise_color_mfp_586dn_firmwarelaserjet_enterprise_flow_mfp_m633zlaserjet_enterprise_m607n_firmwarepagewide_enterprise_color_mfp_586f_firmwarelaserjet_enterprise_m609x_firmwarescanjet_enterprise_flow_n9120_document_flatbed_scanner_firmwarelaserjet_enterprise_800_color_mfp_m880_firmwarelaserjet_enterprise_m608xlaserjet_managed_flow_mfp_e72530_firmwarecolor_laserjet_managed_flow_mfp_e67560zcolor_laserjet_managed_e55040dwcolor_laserjet_managed_mfp_e87640laserjet_managed_flow_mfp_e82540color_laserjet_managed_flow_mfp_e87640laserjet_managed_flow_mfp_e62565h_firmwarecolor_laserjet_enterprise_m652dnlaserjet_managed_mfp_e82540_firmwarelaserjet_enterprise_800_color_mfp_m880pagewide_enterprise_color_x556xh_firmwarepagewide_enterprise_color_flow_mfp_586zcolor_laserjet_managed_flow_mfp_e87640zlaserjet_enterprise_500_color_mfp_m575dnpagewide_enterprise_color_mfp_586dnlaserjet_managed_e60075x_firmwareofficejet_enterprise_color_flow_mfp_x585laserjet_managed_flow_mfp_e72535zlaserjet_managed_flow_mfp_e82540_firmwarelaserjet_enterprise_m609dh_firmwarelaserjet_managed_flow_mfp_e62565zcolor_laserjet_managed_flow_mfp_e77830z_firmwarecolor_laserjet_enterprise_mfp_m577laserjet_managed_flow_mfp_e62555dn_firmwarelaserjet_enterprise_m607dn_firmwarelaserjet_managed_mfp_e72525laserjet_managed_flow_mfp_e72525pagewide_enterprise_color_mpf_785flaserjet_enterprise_m608x_firmwarelaserjet_enterprise_m604_firmwarepagewide_enterprise_color_765dncolor_laserjet_managed_mfp_e77830dn_firmwarelaserjet_managed_e60065xcolor_laserjet_managed_flow_mfp_e87640z_firmwarelaserjet_enterprise_m609dnlaserjet_enterprise_700_m712xhcolor_laserjet_managed_mfp_e67560dh_firmwarelaserjet_managed_flow_mfp_e52545c_firmwarelaserjet_managed_mfp_e62565hs_firmwarelaserjet_managed_flow_mfp_e72535z_firmwarelaserjet_enterprise_mfp_m630laserjet_enterprise_600_m602_firmwarelaserjet_enterprise_mfp_m631dnlaserjet_managed_flow_mfp_e82560zcolor_laserjet_managed_e65050dn_firmwareofficejet_enterprise_color_x555dn_firmwarecolor_laserjet_managed_e65050dnpagewide_managed_color_flow_mfp_e77660zs_firmwarecolor_laserjet_enterprise_mfp_m681dhcolor_laserjet_enterprise_m651_firmwarelaserjet_enterprise_m608ncolor_laserjet_managed_flow_mfp_e87650pagewide_managed_color_e75160dn_firmwarelaserjet_enterprise_color_500_m551laserjet_enterprise_flow_mfp_m631h_firmwarepagewide_managed_color_flow_mfp_e77660ztslaserjet_enterprise_color_flow_mfp_m575cpagewide_enterprise_color_mpf_780fpagewide_enterprise_color_mpf_780f_firmwarepagewide_managed_color_flow_mfp_e58650z_firmwarecolor_laserjet_managed_e65060dncolor_laserjet_enterprise_mfp_m577_firmwarelaserjet_enterprise_m806color_laserjet_enterprise_flow_mfp_m682z_firmwarecolor_laserjet_managed_mfp_e57540dncolor_laserjet_enterprise_mfp_m682dhlaserjet_managed_flow_mfp_e82550_firmwaredigital_sender_flow_8500_fn2_document_capture_workstationcolor_laserjet_managed_mfp_e87640_firmwarelaserjet_enterprise_m4555_mfpcolor_laserjet_managed_flow_mfp_e77822_firmwarelaserjet_enterprise_m506laserjet_enterprise_500_mfp_m525f_firmwarepagewide_managed_color_flow_mfp_e77650zscolor_laserjet_managed_flow_mfp_e57540ccolor_laserjet_managed_mfp_e77822_firmwarepagewide_managed_color_flow_mfp_e77660z_firmwarecolor_laserjet_enterprise_mfp_m682dh_firmwarepagewide_enterprise_color_mpf_785zs_firmwarelaserjet_enterprise_mfp_m632h_firmwarelaserjet_enterprise_m609xcolor_laserjet_enterprise_flow_mfp_m682zlaserjet_managed_mfp_e82550laserjet_enterprise_flow_m830z_mfp_firmwarelaserjet_managed_mfp_e62555dnlaserjet_enterprise_flow_mfp_m525claserjet_enterprise_flow_mfp_m630z_firmwarelaserjet_managed_mfp_e72535dn_firmwarelaserjet_enterprise_mfp_m631zscanjet_enterprise_8500_document_capture_workstationpagewide_enterprise_color_mpf_780dncolor_laserjet_enterprise_mfp_m681f_firmwarecolor_laserjet_enterprise_flow_mfp_m681zlaserjet_managed_mfp_e82540pagewide_enterprise_color_765dn_firmwarepagewide_enterprise_color_x556dn_firmwarecolor_laserjet_managed_mfp_e87640dnofficejet_enterprise_color_x555xhcolor_laserjet_enterprise_m553color_laserjet_managed_mfp_e87660dnlaserjet_enterprise_600_m601laserjet_managed_e60055dncolor_laserjet_enterprise_m653dn_firmwarelaserjet_managed_flow_mfp_e62575zlaserjet_enterprise_flow_mfp_m630zlaserjet_managed_mfp_e52545dn_firmwarelaserjet_managed_flow_mfp_e62565z_firmwarelaserjet_enterprise_flow_mfp_m525c_firmwarecolor_laserjet_managed_mfp_e87650laserjet_enterprise_m606_firmwarelaserjet_enterprise_m506_firmwarelaserjet_enterprise_mfp_m632fhtHP LaserJet Enterprise, HP PageWide Enterprise, HP LaserJet Managed, and HP OfficeJet Enterprise Printers
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-5924
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-9.8||CRITICAL
EPSS-34.86% / 96.88%
||
7 Day CHG~0.00%
Published-13 Aug, 2018 | 15:00
Updated-16 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution.

Action-Not Available
Vendor-HP Inc.
Product-3yz74a_firmwared3q15am2u76_firmwared9l19a_firmwared4h22a_firmwaret3p03a_firmwaret0a23acq891arj6x76a_firmwared9l64a_firmwarej9v82af8b06a_firmwarek7s42a_firmwarecq890arf5s00cq176ab9s58aw1b38g0450_firmwaret0k98ad3a82ad3q17c_firmwaren4l17a_firmwarej9v80a_firmwarecz993a_firmwaret0g56aw1b37_firmwarecq890ccq893e_firmwarea7f65a_firmwarecq891c_firmwarek4t99bcq893bf0v64z4b12_firmwared3q20acm749acn459a_firmwaret3p03aw1b39_firmwarek7v42c_firmwaref5s43_firmwarey0s18ad3q15bf5s65ak9z76aj7a31a_firmwarecn583a_firmwaret3p04aj6x76af5s60am2u81w3u23d7z36a_firmwarej2d37acm750a_firmwarey5h80ae1d36ae1d36a_firmwarem2u85_firmwarey0s19a_firmwarel9d57ag1x85acq893c_firmwarecq176a_firmwarey5h80a_firmwarecq891ar_firmwarecn461a_firmwarex3b09aj6u63_firmwarek7v35v1n08acq890ar_firmwared3q21d_firmwarep0r21a_firmwarea9t80af1h96_firmwarecq891cd4j85bj6u55a_firmwarecr771a_firmwarea9t80b_firmwarew3u25_firmwaree4w43f0v64_firmwarej6u55d_firmwared3q15df5r96a_firmwarew1b33_firmwarecz283a_firmwarecz152a_firmwarecr771acm750a1jl02bd3q19da7f66ad3q19aa9t80bg0450f5r95f8b04am9l70a_firmwaree4w43_firmwarez4b53a_firmwarem2q28a_firmwarez4b12x3b09a_firmwaret8w35a_firmwaren4l17aj2d37a_firmwareg0v47d3q16aj9v87a_firmware1jl02b_firmwaref8b09w3u25t0g25az4b56a_firmwarecz282a_firmwarem9l80acv136acm749a_firmwarev1n01a4sc29aw1b31_firmwarek9h48_firmwaref0m65an4l18ccz276ae3e02ad3q21d1jl02a_firmwaref9a29bc9s13acq890c_firmwaret0f28a_firmwarev1n01a_firmwarea9u28b_firmwarem2u86j7k34a_firmware1dt61a_firmwared4j74t1q00d9l63a_firmwared4h21a_firmwaref9a28a_firmwarecq890a_firmwarez4b53at8x44_firmwaret5d67acq183a_firmwareb9s57cd7z36acn460acq891bf8b05acz025at0g50ak7c84_firmwarev1n02am9l70at8x39_firmwared3q17a_firmwaree3e03acv037aj9v82d_firmwaret0g45acq176k7g18a_firmwaret5d66a_firmwarek7s37a_firmware3yz74acn583aj6u55df1j00w1b33j6u55b_firmwaret6t77a3aw51ad3q15b_firmwarej6x80ad4h21aa9t89av1n02a_firmwarecn598a_firmwarej9v82bcq890ej9v82a_firmwarem2u76cv136a_firmwaret8w35af9a29aa7f65ad9l64ae1d34am9l73af8b06acn216a_firmwarea9u23b4l03m2u85cn581ad3q15a_firmwarecn577a_firmwared7z37at0g25a_firmwarecx042_firmwarej7k33a_firmwarej6u69_firmwarek7v42cd3q20b_firmwarecq893a_firmwarecz045az4b56af9a28b_firmwarez4a54p4c78a_firmwarey3z46f9d36_firmwarecq893ar_firmwarej3p68a_firmwaret3p04a_firmwarem9l81aj9v87ak9t013aw44ab9s58a_firmwared3a78bb4l08a_firmwarecn577az6z97a_firmwarej6u69cz276a_firmwarecq893ea9j411jl02a2nd31af1h96d4h25a_firmwarecq893c2nd31a_firmwareb9s76a9j40acn581a_firmwared3q16a_firmwarecz283ad3p93a_firmwaref9a29a_firmwarem2u86_firmwarej6u59_firmwarek7s34a_firmwareg3j47aj9v80af8b05a_firmwaret5d66af8b12a_firmwarecr768af8b09_firmwarek7g93a_firmwarem2u91_firmwarem9l73a_firmwarek7g93aa9u28bj7a28acq890bf5r96af8b13a_firmwarey5h60a_firmwaret0g56a_firmwarek4u04b_firmware1dt61ak9u05b_firmwarej7k34acx042d3q21ay3z57_firmwarecq176_firmwarey3z44cx017aj6x80a_firmwaref5r95_firmwarej6u55ay3z47e3e02a_firmwaref9a28bj9v86ae3e03a_firmwarecz992a_firmwarek9z76a_firmwarey5h60acq890e_firmwarem2u91d3q17ccn463a_firmwarecq891az6z11ag1w52af9a29b_firmwared3a82a_firmwarej5t77a_firmwaref0m65a_firmwarem2u751sh08cz992a4uj28b_firmwarecr769ak9z76dp4c78ay5z00acr7770a_firmwared3p93am9l65ad3q19a_firmwareg0v48c_firmwaret1q00_firmwaref5s57a_firmwarej9v82ccn459aa9u19ag0v48b_firmwarej5t77ab9s56a_firmwarew3u23_firmwarez4b07a_firmwarem9l80a_firmwarecx017a_firmwarez6z11a_firmwarej6u59j7k33aj7a28a_firmwarek7g86_firmwarecv037a_firmwarek9h57_firmwareb9s76_firmwaref0v67j9v80b_firmware1sh08_firmwareb9s57c_firmwarecz282al9b95ad9l18ad3q20dcn463al8l91a_firmwared3q20c_firmwaret8w51a_firmwaret0g50a_firmwarej6u63m2q28at0f29acz293ad3q16c_firmwarej6u55c_firmwarecr768a_firmwaren9m07ak9h48cq761ad9l18a_firmwaret8x44cz294a_firmwarem9l81a_firmwarey3z44_firmwarecq893an4l14c_firmwared3q17dk9t01_firmwarey3z46_firmwaret6t77a_firmwarecz292a_firmwarez4a54_firmwaref0v63_firmwared9l63ad3q16d_firmwarecq891a_firmwarej6u55ccz045a_firmwaree2d42a_firmwaref0v63z4b07ak9v76j7a31ak7g86d9l20ab4l03_firmwarea9u19a_firmwarecq890aj9v82b_firmwarecn216af5s60a_firmwared4h22acr769a_firmwareb9s56an4k99ck4u04bf5s57aj9v86a_firmwaref5s00_firmwarea9j40a_firmwarej6u57bt1p36_firmwarea9j41_firmwarew1b31g5j38a_firmwarecq761a_firmwarecn460a_firmwaree1d34a_firmwaref1h97cz152ab4l08ag1w52a_firmwared4h24b_firmwarey5z00a_firmwared3q21cg3j47a_firmwarel8l91aj9v80bd3q17acr7770am9l65a_firmwaret0g45a_firmwarew1b37f8b13ay3z47_firmwared3a78b_firmwarej9v82c_firmwarey3z54cq890dt0f28ay3z54_firmwarey0s18a_firmware4sc29a_firmwaret5d67a_firmwaret1p36cz293a_firmwared3q17d_firmwarecn461acq890d_firmwaren4l18c_firmwarek9v76_firmwarecz292al9b95a_firmwarecq890b_firmwaref9a28ak4t99b_firmwarew1b38_firmwarecz284at0k98a_firmwared3q16cf5s65a_firmwarel9d57a_firmwarec9s13a_firmwarek9z76d_firmware3aw51a_firmwared3q15d_firmwarej3p68ay0s19at0g54ak7s42acz993acz284a_firmwarea9t89a_firmwared3q19d_firmwaret0g70acq893b_firmwaret1p99n4k99c_firmwared3q20a_firmwaref8b04a_firmwarey3z45_firmwarej6u57b_firmwarez6z95ad7z37a_firmwarev1n08a_firmware4uj28bcq891b_firmwaret0g54a_firmwarek7s34ad3q16bk9h57e2d42ak7v35_firmwaret8w51af1h97_firmwarek7g18acz025a_firmwarez6z97ag0v47_firmwared9l20a_firmware3aw44a_firmwarey3z57n9m07a_firmwared9l19aa7f66a_firmwarem2u81_firmwarej6u55ba9u23_firmwaref9d36d3q21a_firmwaren4l14ck7c84d3q20d_firmwaref5s43p0r21aa7f64a_firmwaret0f29a_firmwarea7f64aa9t80a_firmwarecq893arcq183ad3q16df1j00_firmwaret8x39g0v48bcn598ay3z45d3q21c_firmwaref8b12av6d27v6d27_firmwarew1b39f0v67_firmwarem2u75_firmwarek9u05bj9v82dz6z95a_firmwaret0a23a_firmwared4j85b_firmwareg5j38at1p99_firmwaret0g70a_firmwared4h25ak7s37ag1x85a_firmwarecz294ad3q20bd4j74_firmwared3q16b_firmwared3q20cg0v48cd4h24bHP inkjet printers
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-7104
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-21.54% / 95.50%
||
7 Day CHG~0.00%
Published-27 Sep, 2018 | 18:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_center_wireless_services_manager_softwareHPE Intelligent Management Center (iMC) Wireless Services Manager Software
CVE-2018-7096
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-5.58% / 89.93%
||
7 Day CHG~0.00%
Published-14 Aug, 2018 | 14:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow code execution.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-3par_service_providerHPE 3PAR Service Processors
CVE-2000-0159
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.69% / 70.82%
||
7 Day CHG~0.00%
Published-18 Apr, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker to gain privileges.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2009-2298
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.77% / 85.47%
||
7 Day CHG~0.00%
Published-02 Jul, 2009 | 10:00
Updated-16 Sep, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in rping in HP OpenView Network Node Manager (OV NNM) 7.53 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a CGI request to webappmon.exe. NOTE: this may overlap CVE-2009-1420.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2005-1826
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.89% / 90.24%
||
7 Day CHG~0.00%
Published-02 Jun, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in HP Radia Notify Daemon 3.1.0.0 (formerly by Novadigm), and other versions including 2.x, 3.x, and 4.x, allows remote attackers to execute arbitrary code via a long file extension.

Action-Not Available
Vendor-n/aHP Inc.
Product-radia_clientn/a
CVE-2010-4029
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.86% / 82.28%
||
7 Day CHG~0.00%
Published-28 Oct, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Storage Essentials before 6.3.0, when LDAP authentication is enabled, allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-storage_essentialsn/a
CVE-2010-4028
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-0.98% / 75.85%
||
7 Day CHG~0.00%
Published-28 Oct, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in LoadRunner Web Tours 9.10 in HP LoadRunner 9.1 and earlier allows remote attackers to cause a denial of service, and possibly obtain sensitive information or modify data, via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-loadrunnerloadrunner_web_toursn/a
CVE-2015-5419
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-7.93% / 91.67%
||
7 Day CHG~0.00%
Published-24 Aug, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP KeyView before 10.23.0.1 and 10.24.x before 10.24.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2879.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2015-5427
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.29%
||
7 Day CHG~0.00%
Published-27 Aug, 2015 | 01:50
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Matrix Operating Environment before 7.5.0 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2015-5428 and CVE-2015-5429.

Action-Not Available
Vendor-n/aHP Inc.
Product-matrix_operating_environmentn/a
CVE-2015-5423
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-7.93% / 91.67%
||
7 Day CHG~0.00%
Published-24 Aug, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP KeyView before 10.23.0.1 and 10.24.x before 10.24.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2884.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2015-5429
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.29%
||
7 Day CHG~0.00%
Published-27 Aug, 2015 | 01:50
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Matrix Operating Environment before 7.5.0 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2015-5427 and CVE-2015-5428.

Action-Not Available
Vendor-n/aHP Inc.
Product-matrix_operating_environmentn/a
CVE-2015-5428
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.29%
||
7 Day CHG~0.00%
Published-27 Aug, 2015 | 01:50
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Matrix Operating Environment before 7.5.0 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2015-5427 and CVE-2015-5429.

Action-Not Available
Vendor-n/aHP Inc.
Product-matrix_operating_environmentn/a
CVE-2015-5416
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-2.32% / 84.15%
||
7 Day CHG~0.00%
Published-24 Aug, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP KeyView before 10.23.0.1 and 10.24.x before 10.24.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2875.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2015-2109
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-0.56% / 67.35%
||
7 Day CHG~0.00%
Published-31 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Operations Orchestration 10.x allows remote attackers to bypass authentication, and obtain sensitive information or modify data, via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-operations_orchestrationn/a
CVE-2015-2117
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-10.15% / 92.81%
||
7 Day CHG~0.00%
Published-26 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP TippingPoint Security Management System (SMS) and TippingPoint Virtual Security Management System (vSMS) before 4.1 patch 3 and 4.2 before patch 1 do not require authentication for JBoss RMI requests, which allows remote attackers to execute arbitrary code by (1) uploading this code within an archive or (2) instantiating a class.

Action-Not Available
Vendor-n/aHP Inc.
Product-tippingpoint_security_management_systemtippingpoint_virtual_security_management_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-26583
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-2.58% / 84.98%
||
7 Day CHG~0.00%
Published-10 May, 2021 | 12:38
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential security vulnerability was identified in HPE iLO Amplifier Pack. The vulnerabilities could be remotely exploited to allow remote code execution.

Action-Not Available
Vendor-n/aHP Inc.
Product-ilo_amplifier_packiLO Amplifier Pack
CVE-2009-0920
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-58.77% / 98.14%
||
7 Day CHG~0.00%
Published-25 Mar, 2009 | 01:00
Updated-07 Aug, 2024 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OvCgi/Toolbar.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long OvOSLocale cookie, a variant of CVE-2008-0067.

Action-Not Available
Vendor-n/aHP Inc.
Product-network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12463
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.3||HIGH
EPSS-19.33% / 95.14%
||
7 Day CHG~0.00%
Published-12 Jul, 2018 | 16:00
Updated-16 Sep, 2024 | 22:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MFSBGN03811 rev.1 - Fortify Software Security Center (SSC), Multiple vulnerabilities

An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.

Action-Not Available
Vendor-Micro Focus International LimitedHP Inc.
Product-fortify_software_security_centerFortify Software Security Center
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2014-2636
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-4.84% / 89.11%
||
7 Day CHG~0.00%
Published-10 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2336.

Action-Not Available
Vendor-n/aHP Inc.
Product-sprintern/a
CVE-2014-2649
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-3.62% / 87.34%
||
7 Day CHG~0.00%
Published-10 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Operations Manager 9.20 on UNIX allows remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.Linux Kernel Organization, Inc
Product-operations_managerkerneln/a
CVE-2014-2614
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.04% / 76.48%
||
7 Day CHG~0.00%
Published-07 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP SiteScope 11.1x through 11.13 and 11.2x through 11.24 allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-2140.

Action-Not Available
Vendor-n/aHP Inc.
Product-sitescopen/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-2638
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-4.84% / 89.11%
||
7 Day CHG~0.00%
Published-10 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2344.

Action-Not Available
Vendor-n/aHP Inc.
Product-sprintern/a
CVE-2003-0028
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-56.05% / 98.01%
||
7 Day CHG~0.00%
Published-21 Mar, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.

Action-Not Available
Vendor-crayopenafsn/aMIT (Massachusetts Institute of Technology)IBM CorporationSilicon Graphics, Inc.OpenBSDFreeBSD FoundationGNUSun Microsystems (Oracle Corporation)HP Inc.
Product-glibchp-uxopenbsdaixhp-ux_series_700solarisirixunicoshp-ux_series_800sunosopenafsfreebsdkerberos_5n/a
CVE-2002-1605
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-27.59% / 96.25%
||
7 Day CHG~0.00%
Published-25 Mar, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows attackers to execute arbitrary code via a long _XKB_CHARSET environment variable to (1) dxpause, (2) dxconsole, or (3) dtsession.

Action-Not Available
Vendor-n/aHP Inc.
Product-tru64hp-uxn/a
CVE-2014-2615
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-7.58% / 91.46%
||
7 Day CHG~0.00%
Published-07 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Universal CMDB 10.01 and 10.10 allows remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors, aka ZDI-CAN-2083.

Action-Not Available
Vendor-n/aHP Inc.
Product-universal_configuration_management_databasen/a
CVE-2002-0763
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.65% / 69.77%
||
7 Day CHG~0.00%
Published-26 Jul, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in administration server for HP VirtualVault 4.5 on HP-UX 11.04 allows remote web servers or privileged external processes to bypass access restrictions and establish connections to the server.

Action-Not Available
Vendor-n/aHP Inc.
Product-virtualvaultn/a
CVE-2014-2637
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-4.84% / 89.11%
||
7 Day CHG~0.00%
Published-10 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2342.

Action-Not Available
Vendor-n/aHP Inc.
Product-sprintern/a
CVE-1999-0502
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-42.28% / 97.35%
||
7 Day CHG~0.00%
Published-04 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Unix account has a default, null, blank, or missing password.

Action-Not Available
Vendor-n/aRed Hat, Inc.Sun Microsystems (Oracle Corporation)HP Inc.
Product-solarislinuxsunoshp-uxn/a
CVE-2012-2013
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.30% / 78.91%
||
7 Day CHG~0.00%
Published-29 Jun, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP System Management Homepage (SMH) before 7.1.1 allows remote attackers to cause a denial of service, or possibly obtain sensitive information or modify data, via unknown vectors.

Action-Not Available
Vendor-n/aMicrosoft CorporationHP Inc.Linux Kernel Organization, Inc
Product-linux_kernelsystem_management_homepagewindowsn/a
CVE-2013-6203
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-4.57% / 88.78%
||
7 Day CHG~0.00%
Published-26 Feb, 2014 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Web Console in HP Application Information Optimizer (formerly HP Database Archiving) 6.2, 6.3, 6.4, 7.0, and 7.1 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, aka ZDI-CAN-1656.

Action-Not Available
Vendor-n/aHP Inc.
Product-application_information_optimizern/a
CVE-2017-8948
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-10.61% / 92.98%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Bypass Security Restriction vulnerability in HPE Network Node Manager i (NNMi) Software versions v10.0x, v10.1x, v10.2x was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-network_node_manager_iNetwork Node Manager i (NNMi) Software
CVE-2017-9000
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-1.36% / 79.36%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ArubaOS, all versions prior to 6.3.1.25, 6.4 prior to 6.4.4.16, 6.5.x prior to 6.5.1.9, 6.5.2, 6.5.3 prior to 6.5.3.3, 6.5.4 prior to 6.5.4.2, 8.x prior to 8.1.0.4 FIPS and non-FIPS versions of software are both affected equally is vulnerable to unauthenticated arbitrary file access. An unauthenticated user with network access to an Aruba mobility controller on TCP port 8080 or 8081 may be able to access arbitrary files stored on the mobility controller. Ports 8080 and 8081 are used for captive portal functionality and are listening, by default, on all IP interfaces of the mobility controller, including captive portal interfaces. The attacker could access files which could contain passwords, keys, and other sensitive information that could lead to full system compromise.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosArubaOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8957
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-53.98% / 97.92%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 04:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerIntelligent Management Center (iMC) PLAT
CWE ID-CWE-20
Improper Input Validation
CVE-2013-6210
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-5.02% / 89.32%
||
7 Day CHG~0.00%
Published-16 Mar, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Unified Functional Testing before 12.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1932.

Action-Not Available
Vendor-n/aHP Inc.
Product-unified_functional_testingn/a
CVE-2013-6201
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-5.52% / 89.86%
||
7 Day CHG~0.00%
Published-06 Mar, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Security Management System 3.3.0, 3.5.0 before patch 1, and 3.6.0 before patch 2 allows remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-security_management_systemn/a
CVE-2013-4825
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.38%
||
7 Day CHG~0.00%
Published-13 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass intended access restrictions via unknown vectors, aka ZDI-CAN-1645.

Action-Not Available
Vendor-n/aHP Inc.
Product-imc_service_operation_management_software_moduleintelligent_management_centern/a
CVE-2013-4844
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-6.38% / 90.62%
||
7 Day CHG~0.00%
Published-29 Nov, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Service Manager 7.11, 9.21, 9.30, 9.31, and 9.32, and ServiceCenter 6.2.8, allows remote attackers to execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-service_centerservice_managern/a
CVE-2013-4824
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-77.70% / 98.95%
||
7 Day CHG~0.00%
Published-13 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.

Action-Not Available
Vendor-n/aHP Inc.
Product-imc_service_operation_management_software_moduleintelligent_management_centern/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-8975
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-53.98% / 97.92%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Code Execution vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-moonshot_provisioning_manager_applianceMoonshot Provisioning Manager Appliance
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4839
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.29%
||
7 Day CHG~0.00%
Published-04 Nov, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1851.

Action-Not Available
Vendor-n/aHP Inc.
Product-loadrunnern/a
CVE-2017-8992
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-2.89% / 85.79%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE has identified a remote privilege escalation vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-centralview_fraud_risk_managementHPE CentralView Fraud Risk Management
CVE-2013-4809
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-0.86% / 74.15%
||
7 Day CHG~0.00%
Published-13 Sep, 2013 | 18:00
Updated-22 Apr, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter.

Action-Not Available
Vendor-n/aHP Inc.
Product-procurve_manageridentity_driven_managern/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 24
  • 25
  • Next
Details not found