Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-13986

Summary
Assigner-microfocus
Assigner Org ID-f81092c5-7f14-476d-80dc-24857f90be84
Published At-29 Sep, 2017 | 14:00
Updated At-05 Aug, 2024 | 19:13
Rejected At-
Credits

A reflected Cross-Site Scripting(XSS) vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows for unintended information when a specific URL is sent to the system.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:microfocus
Assigner Org ID:f81092c5-7f14-476d-80dc-24857f90be84
Published At:29 Sep, 2017 | 14:00
Updated At:05 Aug, 2024 | 19:13
Rejected At:
▼CVE Numbering Authority (CNA)

A reflected Cross-Site Scripting(XSS) vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows for unintended information when a specific URL is sent to the system.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://softwaresupport.hpe.com/km/KM02944672
x_refsource_CONFIRM
http://www.securityfocus.com/bid/100935
vdb-entry
x_refsource_BID
Hyperlink: https://softwaresupport.hpe.com/km/KM02944672
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/100935
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://softwaresupport.hpe.com/km/KM02944672
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/100935
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://softwaresupport.hpe.com/km/KM02944672
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/100935
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@opentext.com
Published At:30 Sep, 2017 | 01:29
Updated At:20 Apr, 2025 | 01:37

A reflected Cross-Site Scripting(XSS) vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows for unintended information when a specific URL is sent to the system.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.1MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.0
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.0c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.5
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.5
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:sp1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.5c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.5c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:sp1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.8
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.8c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.9.0c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.0c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager>>6.11.0
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.11.0:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.0
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.0c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.5
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.5
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:sp1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.5c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.5c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:sp1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.8
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.8c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.9.0
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.0:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:*:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p1:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p2:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.9.1c
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p3:*:*:*:*:*:*
HP Inc.
hp
>>arcsight_enterprise_security_manager_express>>6.11.0
cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.11.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/100935security@opentext.com
N/A
https://softwaresupport.hpe.com/km/KM02944672security@opentext.com
N/A
http://www.securityfocus.com/bid/100935af854a3a-2127-422b-91ae-364da2661108
N/A
https://softwaresupport.hpe.com/km/KM02944672af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://www.securityfocus.com/bid/100935
Source: security@opentext.com
Resource: N/A
Hyperlink: https://softwaresupport.hpe.com/km/KM02944672
Source: security@opentext.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/100935
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://softwaresupport.hpe.com/km/KM02944672
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

12370Records found

CVE-2011-1737
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.67% / 70.39%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the Email application in HP Palm webOS 1.4.5 and 1.4.5.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-palm_webosn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-4109
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.70% / 71.09%
||
7 Day CHG~0.00%
Published-08 Dec, 2010 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Contacts Application in HP Palm webOS before 2.0 allows remote attackers to inject arbitrary web script or HTML via a crafted vCard file.

Action-Not Available
Vendor-n/aHP Inc.
Product-palm_webosn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-4023
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.62% / 69.21%
||
7 Day CHG~0.00%
Published-28 Oct, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP Insight Control Power Management before 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-insight_control_power_managementn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-3012
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.76% / 72.36%
||
7 Day CHG~0.00%
Published-17 Sep, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this issue was originally assigned CVE-2010-3010 due to a CNA error.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-1969
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.95% / 75.44%
||
7 Day CHG~0.00%
Published-22 Jul, 2010 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP Virtual Connect Enterprise Manager for Windows before 6.1 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.Microsoft Corporation
Product-windowsvirtual_connect_enterprise_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-1963
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.60% / 68.35%
||
7 Day CHG~0.00%
Published-07 Jun, 2010 | 14:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP ServiceCenter allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-servicecentern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-3010
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.60% / 68.35%
||
7 Day CHG~0.00%
Published-15 Sep, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability on the HP 3Com OfficeConnect Gigabit VPN Firewall 3CREVF100-73 with firmware before 1.0.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: a separate XSS issue for HP System Management Homepage (SMH) was originally assigned CVE-2010-3010 due to a CNA error, but CVE-2010-3012 is the appropriate identifier for the SMH issue.

Action-Not Available
Vendor-n/aHP Inc.
Product-3com_officeconnect_gigabit_vpn_firewall_software3crevf100-73n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11997
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.42% / 61.02%
||
7 Day CHG~0.00%
Published-16 Jan, 2020 | 18:55
Updated-04 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential security vulnerability has been identified in HPE enhanced Internet Usage Manager (eIUM) versions 8.3 and 9.0. The vulnerability could be used for unauthorized access to information via cross site scripting. HPE has made the following software updates to resolve the vulnerability in eIUM. The eIUM 8.3 FP01 customers are advised to install eIUM83FP01Patch_QXCR1001711284.20190806-1244 patch. The eIUM 9.0 customers are advised to upgrade to eIUM 9.0 FP02 PI5 or later versions. For other versions, please, contact the product support.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-enhanced_internet_usage_managerHPE enhanced Internet Usage Manager (eIUM)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-26584
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.46% / 63.04%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 10:59
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability in HPE OneView for VMware vCenter (OV4VC) could be exploited remotely to allow Cross-Site Scripting. HPE has released the following software update to resolve the vulnerability in HPE OneView for VMware vCenter (OV4VC).

Action-Not Available
Vendor-n/aHP Inc.
Product-oneview_for_vmware_vcenterHPE OneView for VMware vCenter with Operations Manager and Log Insight
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-0280
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.67% / 70.51%
||
7 Day CHG~0.00%
Published-14 Mar, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in HP Power Manager (HPPM) 4.3.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the logType parameter to Contents/exportlogs.asp, (2) the Id parameter to Contents/pagehelp.asp, or the (3) SORTORD or (4) SORTCOL parameter to Contents/applicationlogs.asp. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aHP Inc.
Product-power_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-3289
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.67% / 70.51%
||
7 Day CHG~0.00%
Published-22 Oct, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP Systems Insight Manager (SIM) before 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-systems_insight_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-7117
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.99% / 75.96%
||
7 Day CHG~0.00%
Published-09 Apr, 2019 | 18:28
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.

Action-Not Available
Vendor-n/aHP Inc.
Product-proliant_dl325_gen10proliant_dl560_gen10proliant_dl160_gen10integrated_lights-out_5_firmwareproliant_dl120_gen10proliant_dl20_gen10proliant_dl580_gen10proliant_xl450_gen10proliant_ml110_gen10proliant_xl170r_gen10proliant_ml350_gen10proliant_dl180_gen10proliant_xl190r_gen10proliant_bl460c_gen10proliant_dl360_gen10proliant_ml30_gen10proliant_microserver_gen10proliant_dl385_gen10proliant_dl380_gen10proliant_xl230k_gen10HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-7090
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.45% / 62.87%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE XP P9000 Command View Advanced Edition Software (CVAE) has local and remote cross site scripting vulnerability in versions 7.0.0-00 to earlier than 8.60-00 of DevMgr, TSMgr and RepMgr.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-xp_9000_command_viewHPE XP P9000 Command View Advanced Edition Software (CVAE) versions 7.0.0-00 to earlier than 8.60-00
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-7075
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.45% / 62.87%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote cross-site scripting (XSS) vulnerability was identified in HPE Intelligent Management Center (iMC) PLAT version v7.3 (E0506). The vulnerability is fixed in Intelligent Management Center PLAT 7.3 E0605P04 or subsequent version.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerHPE Intelligent Management Center (IMC)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-6502
Matching Score-10
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-10
Assigner-OpenText (formerly Micro Focus)
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 51.86%
||
7 Day CHG~0.00%
Published-20 Sep, 2018 | 19:00
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MFSBGN03824 rev.1 - ArcSight Management Center, Insufficient Access Control, Reflected Cross Site Scripting, Access Control vulnerability, Cross-Site Request Forgery (CSRF), Unauthenticated File Download, Directory Traversal Vulnerability

A potential Reflected Cross-Site Scripting (XSS) Security vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Reflected Cross-site Scripting (XSS).

Action-Not Available
Vendor-Micro Focus International LimitedHP Inc.
Product-arcsight_management_centerArcSight Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-5444
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.62% / 69.21%
||
7 Day CHG~0.00%
Published-18 Oct, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in HP Smart Profile Server Data Analytics Layer (SPS DAL) 2.3 before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-smart_profile_server_data_analytics_layern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-5441
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.67% / 70.51%
||
7 Day CHG~0.00%
Published-12 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in HP ArcSight Management Center before 2.1 and ArcSight Logger before 6.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-archsight_management_centerarcsight_loggern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-7881
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.60% / 68.35%
||
7 Day CHG~0.00%
Published-15 Jan, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the server in HP Insight Control allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-insight_control_server_deploymentn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-7896
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.60% / 68.35%
||
7 Day CHG~0.00%
Published-03 Mar, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before 7.6.1-06, and HP XP7 Global Link Manager Software (aka HGLM) 6.x through 8.x before 8.1.2-00, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-xp_p9000_device_managerxp_p9000_tiered_storage_managerxp_p9000_replication_managerxp7_global_link_manager_softwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-4833
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.62% / 69.21%
||
7 Day CHG~0.00%
Published-16 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP Service Manager 9.30 through 9.32 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-service_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-4657
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 47.80%
||
7 Day CHG~0.00%
Published-16 Dec, 2020 | 20:35
Updated-17 Sep, 2024 | 01:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling B2B Integrator 5.2.0.0 through 6.0.3.2 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186094.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-sterling_b2b_integratorsolarislinux_kernelihp-uxwindowsaixSterling B2B Integrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-1543
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 36.88%
||
7 Day CHG~0.00%
Published-29 Apr, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in HP Systems Insight Manager (SIM) before 6.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-systems_insight_managern/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2010-3283
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.39% / 59.35%
||
7 Day CHG~0.00%
Published-24 Sep, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2010-1586
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.66% / 70.10%
||
7 Day CHG~0.00%
Published-28 Apr, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-1853
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.70%
||
7 Day CHG~0.00%
Published-08 Apr, 2019 | 14:50
Updated-16 Sep, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 151014.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.Apple Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kernelhp-uxspectrum_protect_backup-archive_clientwindowsmacosaixSpectrum Protect
CWE ID-CWE-1021
Improper Restriction of Rendered UI Layers or Frames
CVE-2014-2642
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 63.69%
||
7 Day CHG~0.00%
Published-02 Oct, 2014 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP System Management Homepage (SMH) before 7.4 allows remote attackers to conduct clickjacking attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-8945
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.14%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Unauthorized Disclosure of Information vulnerability in HPE IceWall Federation Agent version 3.0 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-icewall_federation_agentIceWall Federation Agent
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-2582
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 35.27%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp_command_viewdebian_linuxxp7_command_viewenterprise_linux_server_eusxp_p9000_command_viewjreenterprise_linux_workstationsatellitejdkenterprise_linux_desktopstruxureware_data_center_expertJava
CVE-2012-1996
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.58% / 67.81%
||
7 Day CHG~0.00%
Published-11 Mar, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to modify data via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-systems_insight_managern/a
CVE-2014-2645
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 63.69%
||
7 Day CHG~0.00%
Published-05 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Systems Insight Manager (SIM) before 7.4 allows remote attackers to conduct clickjacking attacks via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-systems_insight_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-14358
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-31 Oct, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A URL redirection to untrusted site vulnerability in HP ArcSight ESM and HP ArcSight ESM Express, in any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1. This vulnerability could be exploited remotely to allow URL redirection to untrusted site.

Action-Not Available
Vendor-Micro Focus International LimitedHP Inc.
Product-arcsight_enterprise_security_managerarcsight_enterprise_security_manager_expressHP ArcSight ESM ExpressHP ArcSight ESM
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2007-3062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-3.53% / 87.20%
||
7 Day CHG~0.00%
Published-06 Jun, 2007 | 01:00
Updated-07 Aug, 2024 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 2.1.2 running on Linux and Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CVE-2016-8961
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.17% / 38.01%
||
7 Day CHG~0.00%
Published-01 Feb, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM BigFix Inventory v9 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.

Action-Not Available
Vendor-Linux Kernel Organization, IncOracle CorporationHP Inc.IBM CorporationMicrosoft Corporation
Product-bigfix_inventorylicense_metric_toolaixsolarishp-uxlinux_kernelwindowsBigFix Inventory
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2003-0914
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-26.75% / 96.16%
||
7 Day CHG~0.00%
Published-02 Dec, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.

Action-Not Available
Vendor-nixucompaqscon/aNetBSDIBM CorporationFreeBSD FoundationInternet Systems Consortium, Inc.Sun Microsystems (Oracle Corporation)HP Inc.
Product-tru64hp-uxnetbsdbindnamesurferaixsolarisunixwaresunosfreebsdn/a
CVE-2016-8521
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.5||MEDIUM
EPSS-1.17% / 77.81%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 23:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote click jacking vulnerability in HPE Diagnostics version 9.24 IP1, 9.26 , 9.26IP1 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-diagnosticsDiagnostics
CWE ID-CWE-20
Improper Input Validation
CVE-2019-2684
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-1.17% / 77.86%
||
7 Day CHG~0.00%
Published-23 Apr, 2019 | 18:16
Updated-02 Oct, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEHP Inc.The Apache Software FoundationOracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp7_command_viewopenshift_container_platformenterprise_linux_server_ausenterprise_linuxsatellitejdkcassandradebian_linuxjreenterprise_linux_workstationenterprise_linux_eustomcatenterprise_linux_server_tusenterprise_linux_desktopleapJava
CVE-2018-7091
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.68%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE XP P9000 Command View Advanced Edition Software (CVAE) has open URL redirection vulnerability in versions 7.0.0-00 to earlier than 8.60-00 of DevMgr, TSMgr and RepMgr.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-xp_9000_command_viewHPE XP P9000 Command View Advanced Edition Software (CVAE)
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-7068
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.01%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE has identified a remote HOST header attack vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-centralview_fraud_risk_managementHPE CentralView Fraud Risk Management
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2018-2973
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 49.76%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 13:00
Updated-02 Oct, 2024 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-HP Inc.NetApp, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_servervirtual_storage_consolexp7_command_viewcloud_backupactive_iq_unified_managersatellitejdkoncommand_workflow_automationsteelstore_cloud_integrated_storageplug-in_for_symantec_netbackupstorage_replication_adapter_for_clustered_data_ontapsnapmanagerjreenterprise_linux_workstatione-series_santricity_os_controllere-series_santricity_storage_managervasa_provider_for_clustered_data_ontaponcommand_unified_managerenterprise_linux_desktoponcommand_insightJava
CVE-2015-5255
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-2.90% / 85.83%
||
7 Day CHG~0.00%
Published-18 Nov, 2015 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe BlazeDS, as used in ColdFusion 10 before Update 18 and 11 before Update 7 and LiveCycle Data Services 3.0.x before 3.0.0.354175, 3.1.x before 3.1.0.354180, 4.5.x before 4.5.1.354177, 4.6.2.x before 4.6.2.354178, and 4.7.x before 4.7.0.354178, allows remote attackers to send HTTP traffic to intranet servers via a crafted XML document, related to a Server-Side Request Forgery (SSRF) issue.

Action-Not Available
Vendor-n/aHP Inc.Adobe Inc.
Product-xp7_command_view_advanced_editioncoldfusionxp_p9000_command_view_advanced_editionlivecycle_data_servicesn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-4000
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-3.7||LOW
EPSS-93.91% / 99.87%
||
7 Day CHG~0.00%
Published-21 May, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Action-Not Available
Vendor-n/aMicrosoft CorporationIBM CorporationDebian GNU/LinuxOracle CorporationMozilla CorporationSUSEGoogle LLCApple Inc.OpenSSLOperaHP Inc.Canonical Ltd.
Product-opera_browserlinux_enterprise_serverfirefoxiphone_osinternet_explorerhp-uxjdklinux_enterprise_desktopthunderbirdnetwork_security_servicesdebian_linuxsparc-opl_service_processorfirefox_oslinux_enterprise_software_development_kitjrockitseamonkeycontent_managerfirefox_esrubuntu_linuxsuse_linux_enterprise_serverchromesafariopenssljremac_os_xn/a
CVE-2021-20562
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.71% / 71.46%
||
7 Day CHG~0.00%
Published-27 Jul, 2021 | 11:25
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199232.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-sterling_b2b_integratorsolarislinux_kernelihp-uxwindowsaixSterling B2B Integrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5113
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.03%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 14:20
Updated-19 Sep, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP Enterprise LaserJet, LaserJet Managed printers - Potential denial of service, potential Cross Site Scripting (XSS)

Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.

Action-Not Available
Vendor-HP Inc.
Product-color_laserjet_managed_mfp_e78625_5qj90alaserjet_managed_e60155_3gy10acolor_laserjet_managed_mfp_e87640_x3a92alaserjet_managed_flow_mfp_e82540_x3a82acolor_laserjet_managed_flow_mfp_e87660_z8z16acolor_laserjet_enterprise_m751_t3u44alaserjet_managed_mfp_e73140_6bs57alaserjet_managed_mfp_e62665_3gy15acolor_laserjet_managed_mfp_e78223-e78228_8gs14acolor_laserjet_managed_flow_e87750_5qk20acolor_laserjet_managed_flow_mfp_e77822_z8z0alaserjet_managed_mfp_e62555_j8j74acolor_laserjet_managed_flow_mfp_e87650_x3a89acolor_laserjet_managed_flow_mfp_e78630_3sj12alaserjet_managed_e60075_m0p33acolor_laserjet_managed_mfp_e87650_z8z12acolor_laserjet_managed_mfp_e78330_8gs28acolor_laserjet_enterprise_m653_j8a06alaserjet_managed_mfp_e826dn_5qk13acolor_laserjet_managed_flow_mfp_e77830_x3a78acolor_laserjet_managed_e55040dw_3gx98acolor_laserjet_managed_mfp_e87740_3sj38acolor_laserjet_managed_flow_mfp_e77825_x3a83alaserjet_managed_flow_mfp_e72525_x3a62acolor_laserjet_enterprise_flow_mfp_m577_b5l54alaserjet_managed_mfp_e42540_3pz75acolor_laserjet_managed_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_e87660_x3a87acolor_laserjet_managed_mfp_e78625_3sj32apagewide_managed_color_mfp_p77940_5zp00acolor_laserjet_enterprise_flow_mfp_m577_b5l47alaserjet_managed_flow_mfp_e82540_z8z23alaserjet_enterprise_m506_f2a70apagewide_managed_color_flow_mfp_e77650z_j7z13alaserjet_managed_mfp_e72525_z8z08acolor_laserjet_enterprise_6700_4y280alaserjet_managed_flow_mfp_e826z_5qk09alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80acolor_laserjet_managed_flow_e87760_3sj20alaserjet_enterprise_flow_mfp_m631_j8j63acolor_laserjet_managed_mfp_e78625_3sj12alaserjet_managed_mfp_e72530_z8z08acolor_laserjet_managed_mfp_e77825_x3a78alaserjet_managed_mfp_e82540_z8z19laserjet_managed_mfp_e82550_x3a68acolor_laserjet_managed_mfp_e78223-e78228_8gs50acolor_laserjet_managed_mfp_e87750_3sj36acolor_laserjet_managed_mfp_e87650_z8z17apagewide_managed_color_flow_mfp_e77660z_j7z07acolor_laserjet_managed_flow_e87750_5qk03acolor_laserjet_managed_flow_mfp_e57540_3gy26acolor_laserjet_managed_flow_e87740_3sj36acolor_laserjet_managed_mfp_e67550_l3u67alaserjet_managed_flow_mfp_e73135_5qj98apagewide_managed_color_mfp_p77960_5zp00acolor_laserjet_managed_mfp_e87770_5qk20apagewide_managed_color_mfp_p77940_y3z68acolor_laserjet_enterprise_mfp_m578_7zu85alaserjet_enterprise_mfp_m632_j8j72acolor_laserjet_managed_flow_mfp_e77830_x3a84alaserjet_enterprise_flow_mfp_m636_7pt00acolor_laserjet_managed_mfp_e87760_3sj37alaserjet_managed_flow_mfp_e82550_z8z23alaserjet_managed_flow_mfp_e72535_z8z06alaserjet_managed_mfp_e72530_x3a60alaserjet_enterprise_mfp_m631_j8j65alaserjet_enterprise_m612_7ps87alaserjet_managed_mfp_e82540du_5cm58acolor_laserjet_managed_mfp_e67560_l3u70alaserjet_managed_mfp_e826dn_3sj29acolor_laserjet_enterprise_mfp_m681_j8a10apagewide_managed_color_mfp_p77950_5zp01acolor_laserjet_managed_mfp_e77822_z8z00alaserjet_managed_flow_mfp_e82540_x3a72alaserjet_enterprise_m611_7ps83apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_managed_mfp_e87640du-e87660du_5rc88alaserjet_managed_mfp_e82560_az8z20apagewide_managed_color_flow_mfp_e77660z_j7z08apagewide_managed_color_mfp_p77950_y3z66acolor_laserjet_managed_mfp_e78330_8gs29alaserjet_managed_flow_mfp_e82560_x3a79acolor_laserjet_managed_flow_mfp_e77830_z8z04acolor_laserjet_managed_mfp_e78323_8gs29apagewide_managed_color_mfp_p77960_y3z68acolor_laserjet_managed_mfp_e877_3sj22acolor_laserjet_managed_flow_mfp_e77830_z8z02acolor_laserjet_managed_flow_e87770_3sj21acolor_laserjet_enterprise_m555_7zu78acolor_laserjet_managed_mfp_e87640du-e87660du_5fm80alaserjet_managed_flow_mfp_e62575_j8j74acolor_laserjet_enterprise_mfp_m776_t3u56alaserjet_managed_flow_mfp_e62675_3gy15alaserjet_managed_mfp_e82560_x3a74alaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71apagewide_color_mfp_779_4pz46alaserjet_managed_mfp_e72535_z8z08acolor_laserjet_enterprise_mfp_m577_b5l48alaserjet_managed_mfp_e82560_x3a79alaserjet_managed_flow_mfp_e62575_j8j67apagewide_managed_color_mfp_e77650_j7z07acolor_laserjet_managed_flow_e87750_3sj20apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m554_7zu81alaserjet_managed_flow_mfp_e62675_3gy18acolor_laserjet_managed_flow_e87740_3sj22acolor_laserjet_enterprise_mfp_6800_4y279acolor_laserjet_managed_mfp_e78330_8gr94acolor_laserjet_managed_mfp_e77422-e77428_5rc91alaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_managed_mfp_e87660_x3a87acolor_laserjet_enterprise_flow_mfp_5800_6qn29alaserjet_managed_mfp_e82540du_5rc85acolor_laserjet_managed_mfp_e77422-e77428_5cm77acolor_laserjet_managed_mfp_e78323_8gs25acolor_laserjet_managed_mfp_e78625_3sj33alaserjet_managed_e82650_3sj08acolor_laserjet_managed_mfp_e57540_3gy26alaserjet_managed_e82660_5qk13acolor_laserjet_managed_mfp_e78323_9rt92alaserjet_managed_flow_mfp_e82560_x3a82acolor_laserjet_managed_mfp_e87650_x3a90alaserjet_managed_flow_mfp_e82550_x3a71acolor_laserjet_managed_flow_mfp_e78635_3sj12alaserjet_managed_mfp_e82540_x3a82alaserjet_managed_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e87660_x3a90alaserjet_enterprise_mfp_m634_7ps95alaserjet_managed_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e78523_5qj83alaserjet_enterprise_m507_1pv87acolor_laserjet_managed_mfp_e87650_x3a93acolor_laserjet_enterprise_flow_mfp_x57945_49k97avlaserjet_managed_mfp_e72535_x3a60apagewide_managed_color_mfp_p77960_2gp25alaserjet_managed_flow_mfp_e731_6bs58acolor_laserjet_managed_flow_mfp_e77825_x3a78acolor_laserjet_managed_mfp_e87650_z8z16alaserjet_enterprise_mfp_m528_1pv49acolor_laserjet_enterprise_flow_mfp_6800_6qn35alaserjet_managed_mfp_e82550du_5cm61acolor_laserjet_managed_mfp_e78625_3sj13alaserjet_managed_flow_e82650_3sj28acolor_laserjet_managed_flow_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e78635_5qk18alaserjet_enterprise_flow_mfp_m632_j8j72alaserjet_managed_mfp_e82540_x3a72alaserjet_managed_e82670_3sj29acolor_laserjet_managed_e65050_l3u55alaserjet_managed_mfp_e82560_x3a68alaserjet_enterprise_m611_7ps84acolor_laserjet_managed_flow_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e78635_3sj13alaserjet_managed_e60075_m0p39apagewide_managed_color_flow_mfp_e77660z_z5g77alaserjet_managed_e60155_3gy12acolor_laserjet_managed_mfp_e78523_5qj81apagewide_managed_color_mfp_p77950_2gp22acolor_laserjet_managed_e65160_3gy04acolor_laserjet_managed_mfp_e87740_3sj35alaserjet_managed_flow_mfp_e72530_z8z010alaserjet_managed_mfp_e62665_3gy17alaserjet_managed_flow_mfp_e73135_3sj00alaserjet_managed_mfp_e73130_3sj01acolor_laserjet_managed_flow_mfp_e78625_3sj11alaserjet_managed_e60155_3gy09alaserjet_enterprise_mfp_m636_7pt01alaserjet_managed_mfp_e730_3sj03alaserjet_managed_flow_mfp_e73135_6bs59acolor_laserjet_managed_flow_mfp_e78625_5qj94acolor_laserjet_managed_flow_mfp_e786_5qj94acolor_laserjet_managed_mfp_e77422-e77428_5rc92alaserjet_managed_flow_mfp_e72530_z8z011alaserjet_managed_e60055_m0p40acolor_laserjet_managed_flow_e87770_3sj36acolor_laserjet_enterprise_flow_mfp_m681_j8a10acolor_laserjet_managed_flow_e87770_3sj20alaserjet_managed_flow_e82670_3sj28apagewide_enterprise_color_flow_mfp_780f_j7z10alaserjet_enterprise_flow_mfp_m635_7ps97alaserjet_managed_mfp_e82560_z8z23alaserjet_managed_flow_mfp_e82560_z8z23acolor_laserjet_managed_mfp_e877_3sj20alaserjet_managed_flow_mfp_e72535_x3a60acolor_laserjet_managed_mfp_e67650_3gy32alaserjet_managed_flow_mfp_e72525_x3a59alaserjet_managed_mfp_e72525_z8z010acolor_laserjet_managed_mfp_e87750_3sj38acolor_laserjet_enterprise_mfp_5800_49k96avlaserjet_managed_flow_mfp_e82550_az8z20acolor_laserjet_managed_mfp_e78330_8gs00acolor_laserjet_managed_mfp_e87640du-e87660du_5cm66acolor_laserjet_managed_mfp_e87640_z8z12alaserjet_managed_mfp_e73135_3sj00apagewide_managed_color_flow_mfp_e77650z_z5g77apagewide_managed_color_mfp_p77960_5zn98alaserjet_managed_e50145_1pu51alaserjet_managed_mfp_e72425_5cm72alaserjet_managed_flow_mfp_e82560_x3a69alaserjet_enterprise_flow_mfp_m527z_f2a78acolor_laserjet_managed_flow_e87770_5qk20alaserjet_managed_flow_mfp_e82540_x3a74acolor_laserjet_managed_m553_bl27alaserjet_enterprise_flow_mfp_m631_j8j64acolor_laserjet_managed_flow_mfp_e87640_z8z16acolor_laserjet_managed_flow_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87650_x3a93acolor_laserjet_managed_flow_mfp_e87650_z8z16acolor_laserjet_managed_mfp_e78323_8gr94acolor_laserjet_managed_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e77822_z8z02acolor_laserjet_managed_mfp_e877_3sj19acolor_laserjet_managed_flow_mfp_e786_3sj13acolor_laserjet_managed_flow_mfp_e78635_3sj11alaserjet_managed_mfp_e72525_x3a59alaserjet_managed_flow_mfp_e826z_3sj08alaserjet_managed_mfp_e826dn_3sj07acolor_laserjet_enterprise_mfp_x57945_6qp99alaserjet_managed_e60065_m0p36alaserjet_enterprise_mfp_m527_f2a76alaserjet_managed_mfp_e82540du_5fm78alaserjet_managed_flow_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e82550_x3a82alaserjet_managed_mfp_e72530_x3a59acolor_laserjet_managed_mfp_e77830_z8z05apagewide_managed_color_flow_mfp_e77650z_z5g79alaserjet_managed_mfp_e82550du_5fm78alaserjet_managed_flow_mfp_e73140_3sj02alaserjet_enterprise_m610_7ps82alaserjet_managed_mfp_m527_f2a80acolor_laserjet_managed_flow_mfp_e87650_z8z13alaserjet_managed_mfp_e62655_3gy17apagewide_managed_color_e55650_l3u44acolor_laserjet_enterprise_flow_mfp_m578_7zu85alaserjet_managed_mfp_e73130_6bs59alaserjet_managed_mfp_e72525_x3a65acolor_laserjet_managed_mfp_e77422-e77428_5cm76acolor_laserjet_enterprise_mfp_m578_7zu86apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_e87760_3sj36acolor_laserjet_managed_e65060_l3u57acolor_laserjet_managed_mfp_e77822_z8z04acolor_laserjet_managed_flow_e87760_5qk03acolor_laserjet_managed_flow_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e73130_5qj98alaserjet_managed_flow_mfp_e731_5qj98acolor_laserjet_enterprise_x55745_49k99acolor_laserjet_managed_flow_e87750_3sj22acolor_laserjet_managed_flow_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e77830_x3a81alaserjet_managed_flow_mfp_e62675_3gy16acolor_laserjet_enterprise_flow_mfp_m577_b5l48alaserjet_managed_flow_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e785dn_5qj81alaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_managed_flow_e82650_3sj09alaserjet_managed_flow_e82670_3sj07alaserjet_managed_mfp_e72535_z8z011acolor_laserjet_enterprise_flow_mfp_m578_7zu88alaserjet_managed_flow_mfp_e72525_x3a60acolor_laserjet_managed_mfp_e87750_3sj19alaserjet_managed_e82650_5qk13alaserjet_managed_mfp_e82540du_5fm77acolor_laserjet_managed_mfp_e78635_5qj94alaserjet_managed_mfp_e72535_z8z06alaserjet_managed_flow_mfp_e72525_x3a65alaserjet_managed_flow_mfp_e82550_x3a79acolor_laserjet_managed_mfp_e877_3sj37acolor_laserjet_managed_flow_mfp_e78625_3sj13acolor_laserjet_managed_mfp_e78323_8gs28alaserjet_enterprise_flow_mfp_m635_7ps99alaserjet_managed_mfp_e72535_x3a62acolor_laserjet_managed_mfp_m577_b5l50alaserjet_managed_mfp_e82550_x3a69alaserjet_managed_mfp_e82560_x3a71alaserjet_managed_mfp_e72425_5cm70acolor_laserjet_managed_flow_e87760_5qk08acolor_laserjet_enterprise_flow_mfp_m578_7zu86alaserjet_enterprise_mfp_m631_j8j64alaserjet_managed_mfp_e73030_5qj87acolor_laserjet_enterprise_mfp_5800_6qn31acolor_laserjet_managed_mfp_e786_3sj13acolor_laserjet_managed_m553_b5l39acolor_laserjet_managed_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e72525_x3a63alaserjet_managed_mfp_e82560du_5fm78acolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_flow_mfp_e78625_5qj90apagewide_managed_color_mfp_e77650_z5g77alaserjet_managed_mfp_e72525_x3a63alaserjet_enterprise_m608_k0q18alaserjet_managed_mfp_e62665_3gy16acolor_laserjet_managed_flow_mfp_e77822_x3a81acolor_laserjet_managed_mfp_e78323_8pe97acolor_laserjet_managed_mfp_e78630_5qj90acolor_laserjet_managed_mfp_e77822_x3a81apagewide_managed_color_mfp_e77650_z5g79acolor_laserjet_managed_mfp_e87640_z8z16alaserjet_managed_flow_mfp_e62555_j8j79apagewide_managed_color_mfp_p77960_y3z64alaserjet_managed_mfp_e72535_x3a59acolor_laserjet_managed_mfp_e77825_x3a80alaserjet_managed_mfp_e72530_x3a63alaserjet_managed_flow_mfp_e82560_z8z22alaserjet_managed_flow_mfp_e826z_3sj29alaserjet_managed_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e77830_x3a81acolor_laserjet_managed_flow_mfp_e77830_z8z0acolor_laserjet_managed_flow_e87770_5qk03alaserjet_managed_mfp_e73135_6bs58acolor_laserjet_managed_flow_e87760_3sj38alaserjet_enterprise_m607_k0q15acolor_laserjet_managed_flow_mfp_e87640_x3a93acolor_laserjet_managed_mfp_e77422-e77428_5cm79alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14apagewide_enterprise_color_mfp_780_j7z10acolor_laserjet_managed_mfp_e87650_x3a92alaserjet_managed_mfp_e72530_z8z010alaserjet_managed_e82670_3sj28alaserjet_managed_e60075_m0p40acolor_laserjet_enterprise_flow_mfp_6800_4y279alaserjet_enterprise_mfp_m633_j8j76alaserjet_managed_mfp_e82560du_5rc84acolor_laserjet_managed_mfp_e87750_3sj21alaserjet_managed_flow_mfp_e62555_j8j67alaserjet_managed_m506_f2a71acolor_laserjet_managed_flow_mfp_e87650_x3a87apagewide_enterprise_color_mfp_586_g1w39apagewide_managed_color_mfp_p77940_5zn99alaserjet_enterprise_flow_mfp_m634_7ps96acolor_laserjet_managed_mfp_e78528_5qj81alaserjet_managed_mfp_e72430_5cm68acolor_laserjet_managed_mfp_e87770_3sj21acolor_laserjet_enterprise_6701_4y280acolor_laserjet_managed_mfp_e78323_9rt91acolor_laserjet_managed_mfp_e78330_8gs27alaserjet_enterprise_mfp_m527_f2a81alaserjet_managed_mfp_e731_3sj02alaserjet_enterprise_m506_f2a68alaserjet_managed_e60075_m0p35alaserjet_enterprise_m608_m0p32acolor_laserjet_managed_mfp_e87660_x3a93acolor_laserjet_managed_m553_b5l25apagewide_managed_color_mfp_p77950_5zn98acolor_laserjet_managed_mfp_e78323_8pe95acolor_laserjet_enterprise_flow_mfp_m681_j8a12alaserjet_managed_mfp_e72525_x3a60alaserjet_managed_mfp_e731_3sj01acolor_laserjet_managed_mfp_e786_5qj90acolor_laserjet_managed_flow_mfp_e67550_l3u67apagewide_enterprise_color_556_g1w46acolor_laserjet_enterprise_flow_mfp_x57945_6qp99acolor_laserjet_managed_flow_e87760_3sj37acolor_laserjet_enterprise_mfp_5800_6qn29acolor_laserjet_managed_flow_e87740_3sj35acolor_laserjet_managed_mfp_e78330_8pe97alaserjet_managed_mfp_e72535_z8z07alaserjet_enterprise_flow_mfp_m631_j8j65acolor_laserjet_managed_mfp_e78323_8gr98acolor_laserjet_managed_mfp_e78625_3sj34acolor_laserjet_managed_mfp_e877_3sj21alaserjet_managed_e50045_3gn19acolor_laserjet_managed_mfp_e78323_8gs00acolor_laserjet_managed_flow_mfp_e786_3sj32acolor_laserjet_managed_mfp_e78330_8gr98acolor_laserjet_managed_mfp_e87770_3sj36acolor_laserjet_managed_flow_e87750_3sj36acolor_laserjet_managed_mfp_e78323_8pe96acolor_laserjet_managed_mfp_e78330_8gs30acolor_laserjet_managed_mfp_e78635_5qk18alaserjet_managed_mfp_e73135_3sj01alaserjet_managed_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e87660_z8z15acolor_laserjet_managed_mfp_e67550_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj11alaserjet_managed_flow_mfp_e82540_z8z22alaserjet_managed_mfp_e72425_5cm71alaserjet_managed_flow_mfp_e82560_z8z18apagewide_managed_color_mfp_p77950_5zp00acolor_laserjet_managed_mfp_e87650_x3a89alaserjet_enterprise_mfp_m631_j8j63acolor_laserjet_managed_flow_mfp_e87650_z8z17acolor_laserjet_managed_flow_mfp_e87660_x3a93alaserjet_managed_flow_mfp_e72530_x3a63apagewide_managed_color_mfp_p77960_y3z63alaserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_flow_mfp_e78625_3sj12alaserjet_managed_e82660_3sj29alaserjet_enterprise_mfp_m632_j8j70acolor_laserjet_managed_mfp_e78330_8pe94acolor_laserjet_enterprise_mfp_m681_j8a13acolor_laserjet_managed_flow_mfp_e87640_x3a89alaserjet_managed_e82670_3sj08alaserjet_managed_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e87660_z8z17acolor_laserjet_managed_mfp_e87640_x3a89alaserjet_managed_flow_mfp_e73135_3sj01alaserjet_managed_flow_mfp_e82560_x3a71alaserjet_managed_flow_e82670_5qk13apagewide_managed_color_flow_mfp_e77660z_j7z05acolor_laserjet_managed_mfp_e78323_8pe94alaserjet_managed_flow_e82660_3sj09acolor_laserjet_managed_flow_e87740_3sj38acolor_laserjet_enterprise_m856_t3u51acolor_laserjet_managed_mfp_e77822_x3a83acolor_laserjet_enterprise_flow_mfp_m776_t3u56alaserjet_managed_flow_mfp_e82540_z8z19color_laserjet_enterprise_mfp_m577_b5l46alaserjet_managed_e60065_m0p40acolor_laserjet_managed_mfp_e87740_3sj22alaserjet_managed_mfp_e73135_5qj98alaserjet_managed_mfp_e82540_z8z23apagewide_color_mfp_774_4pa44acolor_laserjet_managed_flow_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e62675_3gy17alaserjet_managed_mfp_e82550du_5cm58acolor_laserjet_managed_flow_mfp_e67550_l3u66acolor_laserjet_managed_flow_mfp_e78635_3sj13acolor_laserjet_enterprise_mfp_6800_6qn38acolor_laserjet_managed_mfp_e78223-e78228_8gs37alaserjet_managed_e60055_m0p35alaserjet_managed_mfp_e72430_5rc90alaserjet_managed_flow_mfp_e731_6bs59acolor_laserjet_enterprise_m653_j8a05alaserjet_managed_flow_e82670_3sj09alaserjet_managed_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e77825_z8z00alaserjet_managed_e82650_3sj30alaserjet_managed_mfp_e82550_x3a75acolor_laserjet_managed_mfp_e77825_z8z01apagewide_color_mfp_774_4pz43acolor_laserjet_enterprise_m553_b5l25alaserjet_managed_mfp_e82550_z8z22acolor_laserjet_managed_flow_mfp_e77822_x3a84acolor_laserjet_managed_mfp_e77422-e77428_5cm75alaserjet_enterprise_m609_k0q21alaserjet_managed_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e78330_8gr99acolor_laserjet_managed_mfp_e78330_8gs25alaserjet_managed_mfp_e82550du_5rc84acolor_laserjet_managed_mfp_e786_3sj32alaserjet_enterprise_m608_k0q19acolor_laserjet_enterprise_flow_mfp_5800_6qn31acolor_laserjet_managed_flow_mfp_e87640_z8z17alaserjet_managed_mfp_e82560du_5rc85acolor_laserjet_enterprise_mfp_m682_j8a17acolor_laserjet_managed_mfp_e78523_5qk15alaserjet_managed_flow_mfp_e62565_j8j73acolor_laserjet_enterprise_flow_mfp_m578_7zu87acolor_laserjet_enterprise_flow_mfp_m682_j8a16alaserjet_enterprise_flow_mfp_m634_7ps95apagewide_enterprise_color_765_j7z04alaserjet_managed_mfp_e72525_z8z06alaserjet_managed_flow_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e87750_5qk20alaserjet_managed_e60165_3gy12alaserjet_managed_flow_mfp_e82550_x3a68alaserjet_managed_mfp_e82540du_5cm61alaserjet_enterprise_flow_mfp_m527z_f2a76alaserjet_managed_flow_mfp_e73130_3sj00apagewide_managed_color_mfp_e77650_j7z05alaserjet_managed_mfp_e82550du_5rc85alaserjet_managed_flow_mfp_e82540_x3a75acolor_laserjet_managed_mfp_e78323_8gr97acolor_laserjet_managed_mfp_e78630_3sj13alaserjet_managed_mfp_e72530_x3a62apagewide_managed_color_mfp_e58650dn_l3u42acolor_laserjet_managed_flow_mfp_e77830_z8z01apagewide_enterprise_color_flow_mfp_785_j7z11alaserjet_managed_flow_mfp_e72530_x3a60acolor_laserjet_managed_e65050_l3u56acolor_laserjet_managed_flow_e87760_3sj22acolor_laserjet_managed_mfp_e87660_z8z17alaserjet_managed_mfp_e73135_6bs57apagewide_managed_color_mfp_p77950_2gp25alaserjet_managed_flow_mfp_e72535_z8z010apagewide_managed_color_mfp_p77940_y3z62acolor_laserjet_managed_mfp_e785dn_5qk15acolor_laserjet_managed_flow_mfp_e87640_z8z13acolor_laserjet_managed_flow_mfp_e77825_x3a80acolor_laserjet_managed_mfp_e78630_5qj94acolor_laserjet_enterprise_m455_3pz95alaserjet_managed_mfp_e82540_x3a68alaserjet_managed_mfp_e72430_5cm69acolor_laserjet_managed_mfp_e78223-e78228_8gs13acolor_laserjet_managed_flow_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_m577_b5l50alaserjet_enterprise_m406_3pz15alaserjet_managed_mfp_e73130_3sj02acolor_laserjet_managed_flow_mfp_e87660_x3a89acolor_laserjet_managed_flow_mfp_e78630_5qj94alaserjet_managed_mfp_e82540_x3a75alaserjet_managed_e60055_m0p36acolor_laserjet_enterprise_m856_t3u52acolor_laserjet_enterprise_flow_mfp_m681_j8a13apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_enterprise_mfp_m577_b5l47acolor_laserjet_managed_mfp_e87660_z8z15acolor_laserjet_managed_flow_mfp_e78625_3sj33acolor_laserjet_managed_flow_mfp_e78635_3sj33alaserjet_managed_e60175_3gy10alaserjet_managed_mfp_e73025_5qj87acolor_laserjet_managed_mfp_e786_3sj11acolor_laserjet_managed_flow_mfp_m577_b5l49acolor_laserjet_managed_mfp_e78330_8gs26acolor_laserjet_enterprise_mfp_5800_58r10alaserjet_managed_mfp_e73025_3sj04alaserjet_managed_mfp_e72430_5cm70alaserjet_managed_mfp_e72535_z8z09alaserjet_managed_mfp_e730_3sj04acolor_laserjet_managed_mfp_e78635_3sj12acolor_laserjet_managed_mfp_e67560_l3u69alaserjet_managed_flow_mfp_e73140_5qk02alaserjet_managed_mfp_e82540du_5rc83apagewide_managed_color_mfp_p77940_2gp22acolor_laserjet_managed_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e826z_3sj28alaserjet_managed_e82650_3sj07alaserjet_managed_flow_mfp_e72535_x3a66acolor_laserjet_managed_mfp_e77822_z8z05acolor_laserjet_managed_mfp_e87760_5qk08alaserjet_managed_mfp_e73140_6bs58acolor_laserjet_managed_flow_e87750_3sj19acolor_laserjet_managed_mfp_e87640du-e87660du_5cm65alaserjet_enterprise_m610_7ps81alaserjet_managed_mfp_e72425_5rc89acolor_laserjet_managed_mfp_e77830_x3a84acolor_laserjet_managed_mfp_e877_5qk20acolor_laserjet_managed_mfp_e87760_3sj36acolor_laserjet_managed_mfp_e78630_3sj12acolor_laserjet_managed_mfp_e87660_x3a86apagewide_managed_color_flow_mfp_e77660z_j7z03alaserjet_managed_flow_mfp_e82550_x3a75alaserjet_managed_mfp_e82560du_5cm58acolor_laserjet_managed_mfp_e77822_z8z01acolor_laserjet_enterprise_m653_j8a04alaserjet_enterprise_mfp_m636_7pt00alaserjet_managed_flow_mfp_e72530_z8z09acolor_laserjet_enterprise_flow_mfp_m776_t3u55acolor_laserjet_managed_flow_mfp_e77825_z8z02acolor_laserjet_managed_mfp_e78330_8pe96alaserjet_managed_m506_f2a66acolor_laserjet_managed_mfp_e77825_x3a84acolor_laserjet_managed_mfp_e87640_z8z17alaserjet_managed_mfp_e73140_3sj02alaserjet_managed_mfp_e52645_1ps54alaserjet_managed_e82670_5qk09acolor_laserjet_managed_mfp_e78630_3sj34alaserjet_managed_e82660_3sj07alaserjet_managed_mfp_e72535_x3a66alaserjet_managed_mfp_e82560_x3a82alaserjet_managed_m506_f2a68acolor_laserjet_managed_mfp_e77422-e77428_5cm78acolor_laserjet_managed_mfp_e67550_l3u66acolor_laserjet_enterprise_mfp_m681_j8a11acolor_laserjet_managed_mfp_e786_3sj34acolor_laserjet_managed_mfp_e78323_8gs01alaserjet_managed_e82670_3sj07acolor_laserjet_managed_flow_e87750_5qk08acolor_laserjet_managed_mfp_e77822_x3a77acolor_laserjet_managed_mfp_e67650_3gy31alaserjet_managed_flow_e82650_3sj29alaserjet_managed_mfp_e72530_z8z09apagewide_managed_color_mfp_p77960_2gp22apagewide_managed_color_flow_mfp_e77650z_j7z05acolor_laserjet_managed_mfp_e87660_z8z16acolor_laserjet_enterprise_6700_49l00alaserjet_managed_mfp_e82540_z8z22apagewide_managed_color_mfp_p77960_y3z66apagewide_managed_color_mfp_e77650_j7z03alaserjet_managed_mfp_e731_6bs58alaserjet_managed_flow_mfp_e72525_z8z08acolor_laserjet_managed_flow_mfp_e67550_l3u69alaserjet_managed_flow_mfp_e82560_x3a74acolor_laserjet_managed_mfp_e77822_x3a84apagewide_managed_color_flow_mfp_e77660z_j7z14acolor_laserjet_managed_flow_e87740_3sj19alaserjet_managed_mfp_e731_6bs57alaserjet_enterprise_m609_k0q22alaserjet_managed_e60175_3gy09acolor_laserjet_managed_mfp_e78323_8gs30acolor_laserjet_managed_mfp_e57540_3gy25acolor_laserjet_managed_mfp_e67660_3gy31acolor_laserjet_managed_mfp_e77830_z8z01alaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_m506_f2a66acolor_laserjet_managed_e65060_l3u56alaserjet_enterprise_m507_1pv88alaserjet_managed_mfp_e72525_x3a66acolor_laserjet_enterprise_mfp_m578_7zu88acolor_laserjet_enterprise_flow_mfp_6800_6qn37apagewide_managed_color_mfp_e77650_j7z08alaserjet_managed_flow_mfp_e62555_j8j74alaserjet_managed_mfp_e72530_x3a65alaserjet_managed_e82650_3sj09alaserjet_enterprise_mfp_m633_j8j78alaserjet_managed_mfp_e82550_az8z20alaserjet_managed_mfp_e82560du_5cm61acolor_laserjet_enterprise_5700_6qn28alaserjet_enterprise_mfp_m431_3pz56acolor_laserjet_managed_mfp_e67660_3gy32alaserjet_managed_e60055_m0p39alaserjet_enterprise_flow_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78323_8gs27acolor_laserjet_managed_flow_e87760_3sj21acolor_laserjet_managed_mfp_e87760_5qk20alaserjet_managed_flow_mfp_e73130_3sj02alaserjet_managed_m506_f2a69acolor_laserjet_managed_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e72535_z8z08alaserjet_managed_mfp_e82560_z8z22alaserjet_managed_mfp_e52545_3gy19acolor_laserjet_enterprise_mfp_6800_6qn36acolor_laserjet_managed_flow_mfp_e77825_z8z01acolor_laserjet_managed_flow_e87760_3sj35acolor_laserjet_managed_flow_mfp_e77825_x3a81acolor_laserjet_managed_flow_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e87640_z8z12alaserjet_managed_flow_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e78630_3sj34acolor_laserjet_managed_e65050_l3u57apagewide_managed_color_mfp_p77960_y3z62acolor_laserjet_enterprise_m553_b5l26alaserjet_managed_flow_mfp_e82540_x3a79alaserjet_managed_mfp_e72430_5rc89alaserjet_enterprise_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87660_z8z14alaserjet_managed_mfp_e82560_x3a69acolor_laserjet_managed_flow_mfp_e786_5qj90apagewide_managed_color_mfp_p77950_y3z64acolor_laserjet_managed_mfp_e87740_5qk03acolor_laserjet_managed_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e67560_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj12alaserjet_managed_flow_e82660_3sj08acolor_laserjet_managed_e75245_t3u64alaserjet_managed_flow_e82660_5qk09acolor_laserjet_enterprise_6700_6qn33alaserjet_managed_flow_mfp_e82550_z8z18acolor_laserjet_managed_flow_mfp_e87650_x3a86acolor_laserjet_managed_flow_mfp_e77830_x3a77alaserjet_enterprise_mfp_m634_7ps96alaserjet_managed_mfp_e82540du_5cm59acolor_laserjet_managed_mfp_e87760_3sj20alaserjet_managed_e82670_5qk13acolor_laserjet_managed_flow_mfp_e77825_z8z00acolor_laserjet_managed_mfp_e77825_z8z0acolor_laserjet_managed_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e786_5qk18alaserjet_managed_flow_mfp_m527z_f2a79acolor_laserjet_managed_mfp_e877_3sj36acolor_laserjet_enterprise_mfp_m682_j8a16alaserjet_managed_mfp_e731_5qk02acolor_laserjet_managed_flow_e87770_3sj35alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_managed_mfp_e78630_3sj11alaserjet_managed_e60065_m0p39alaserjet_managed_e60055_m0p33acolor_laserjet_managed_flow_mfp_e77822_z8z01alaserjet_managed_flow_mfp_e72525_x3a66alaserjet_managed_flow_mfp_e72535_z8z09acolor_laserjet_managed_flow_e87740_5qk20alaserjet_enterprise_mfp_m635_7ps99alaserjet_managed_flow_mfp_e82550_z8z22alaserjet_managed_flow_mfp_e72535_x3a65alaserjet_managed_mfp_e82540du_5rc84apagewide_managed_color_mfp_p77940_y3z63alaserjet_managed_flow_mfp_e72530_x3a62acolor_laserjet_managed_flow_mfp_e87650_z8z12alaserjet_managed_mfp_e73130_5qj98acolor_laserjet_managed_mfp_e77830_z8z02alaserjet_managed_flow_mfp_e731_3sj01acolor_laserjet_enterprise_flow_mfp_5800_6qn30alaserjet_managed_flow_mfp_e73140_6bs59alaserjet_enterprise_flow_mfp_m633_j8j76alaserjet_managed_mfp_e826dn_3sj08acolor_laserjet_managed_mfp_e87640_z8z13alaserjet_managed_flow_e82660_3sj28acolor_laserjet_managed_mfp_e78528_5qk15alaserjet_managed_e82650_3sj28acolor_laserjet_enterprise_m553_bl27acolor_laserjet_managed_mfp_e77825_x3a81apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_flow_e87740_3sj37alaserjet_managed_mfp_e72525_z8z011acolor_laserjet_enterprise_flow_mfp_5800_58r10acolor_laserjet_managed_flow_mfp_e77830_x3a80apagewide_managed_color_mfp_p77960_y3z65acolor_laserjet_managed_flow_mfp_e87650_x3a92acolor_laserjet_managed_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87640_x3a87acolor_laserjet_managed_mfp_e786_5qj94alaserjet_managed_flow_mfp_e82550_x3a69acolor_laserjet_managed_mfp_e78323_8gs26acolor_laserjet_managed_mfp_e87740_3sj36acolor_laserjet_managed_flow_mfp_e78635_5qj90acolor_laserjet_managed_flow_mfp_e87660_x3a86acolor_laserjet_managed_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78330_8pe95acolor_laserjet_managed_mfp_e78630_5qk18apagewide_managed_color_flow_mfp_e77650z_j7z08alaserjet_enterprise_m407_3pz16apagewide_enterprise_color_flow_mfp_586z_g1w40acolor_laserjet_managed_flow_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e73130_6bs59alaserjet_managed_flow_mfp_e73130_6bs57alaserjet_managed_e82670_3sj09acolor_laserjet_managed_e65150_3gy03acolor_laserjet_managed_mfp_e87760_3sj35alaserjet_managed_mfp_e82550_z8z23alaserjet_managed_mfp_e82540_z8z18acolor_laserjet_managed_mfp_e78330_9rt92acolor_laserjet_managed_flow_mfp_e77822_x3a78apagewide_managed_color_flow_mfp_e77650z_j7z14acolor_laserjet_managed_flow_e87770_3sj19apagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_managed_flow_mfp_e72530_z8z07acolor_laserjet_enterprise_flow_mfp_m682_j8a17acolor_laserjet_managed_flow_mfp_e77825_x3a77alaserjet_managed_flow_mfp_e73140_6bs57acolor_laserjet_managed_mfp_e78223-e78228_8gs43alaserjet_managed_flow_mfp_e82560_z8z19laserjet_managed_mfp_e72525_z8z07acolor_laserjet_enterprise_6701_49l00acolor_laserjet_managed_mfp_e78223-e78228_8gs44alaserjet_managed_mfp_e73140_3sj01apagewide_color_755_4pz47apagewide_enterprise_color_mfp_780_j7z09acolor_laserjet_enterprise_flow_mfp_6800_6qn38acolor_laserjet_managed_mfp_e87740_3sj19acolor_laserjet_managed_flow_e87740_3sj21acolor_laserjet_managed_mfp_e78323_8gr96acolor_laserjet_managed_mfp_e87640du-e87660du_5fm81acolor_laserjet_managed_flow_mfp_e87640_x3a86apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_managed_mfp_e826dn_3sj30acolor_laserjet_managed_flow_e87740_5qk03apagewide_managed_color_e75160_j7z06alaserjet_managed_flow_e82670_3sj08acolor_laserjet_managed_mfp_e87740_5qk08acolor_laserjet_managed_mfp_e78330_8gr97alaserjet_managed_flow_mfp_e73135_6bs58afuturesmart_5laserjet_managed_mfp_e82540_az8z20alaserjet_managed_flow_e82660_3sj07apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_enterprise_m652_j7z99alaserjet_managed_e60065_m0p35alaserjet_managed_flow_mfp_e731_3sj02acolor_laserjet_managed_flow_e87760_5qk20apagewide_managed_color_flow_mfp_e58650z_l3u42acolor_laserjet_managed_mfp_e87640du-e87660du_5rc87alaserjet_managed_mfp_e62565_j8j79acolor_laserjet_managed_mfp_e87760_3sj19apagewide_managed_color_flow_mfp_e77660z_z5g79apagewide_managed_color_mfp_p77960_5zn99alaserjet_managed_flow_mfp_e72525_z8z010alaserjet_managed_flow_mfp_e73130_3sj01alaserjet_managed_e60165_3gy09acolor_laserjet_managed_mfp_e78223-e78228_17f27awcolor_laserjet_managed_mfp_e87770_3sj22alaserjet_managed_flow_mfp_e72525_z8z07alaserjet_managed_flow_mfp_e826z_5qk13alaserjet_managed_mfp_e82540_x3a79apagewide_managed_color_mfp_p77950_y3z65apagewide_managed_color_flow_mfp_e77650z_j7z03acolor_laserjet_managed_mfp_e785dn_5qj83acolor_laserjet_managed_mfp_e78323_8gr99acolor_laserjet_managed_mfp_e77825_x3a77acolor_laserjet_managed_mfp_e77830_x3a80alaserjet_managed_mfp_e72530_z8z06alaserjet_managed_flow_mfp_e82550_x3a72acolor_laserjet_managed_mfp_e87760_3sj38alaserjet_managed_flow_mfp_e731_6bs57alaserjet_managed_flow_mfp_e72535_z8z011alaserjet_managed_flow_mfp_e72530_z8z06alaserjet_managed_flow_e82660_5qk13apagewide_enterprise_color_556_g1w47vcolor_laserjet_managed_mfp_e87640_x3a86alaserjet_managed_mfp_e82550du_5rc83alaserjet_managed_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e78330_9rt91acolor_laserjet_managed_e45028_3qa35acolor_laserjet_managed_flow_mfp_e77822_x3a80alaserjet_managed_e82660_5qk09acolor_laserjet_enterprise_mfp_6800_49k84acolor_laserjet_managed_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e786_3sj33apagewide_enterprise_color_flow_mfp_586z_g1w39alaserjet_managed_flow_mfp_e82560_x3a68acolor_laserjet_managed_mfp_e78528_5qj83alaserjet_managed_flow_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e78625_3sj34acolor_laserjet_managed_flow_mfp_e78630_3sj13acolor_laserjet_managed_flow_mfp_e78630_3sj11alaserjet_managed_e60175_3gy12apagewide_managed_color_p75250_y3z49apagewide_managed_color_mfp_p77960_y3z61alaserjet_managed_flow_e82650_3sj08apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m506_f2a67acolor_laserjet_managed_flow_mfp_e78635_3sj34alaserjet_enterprise_flow_mfp_m527z_f2a81acolor_laserjet_managed_flow_mfp_e77822_z8z05alaserjet_managed_mfp_m527_f2a79acolor_laserjet_managed_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e77822_x3a80alaserjet_enterprise_mfp_m528_1pv65alaserjet_managed_flow_e82670_3sj29acolor_laserjet_managed_flow_mfp_e87640_z8z15apagewide_color_mfp_779_4pz45apagewide_managed_color_mfp_p77950_y3z63acolor_laserjet_managed_mfp_e78223-e78228_8gs12alaserjet_managed_mfp_e82560_x3a75alaserjet_enterprise_m612_7ps86acolor_laserjet_managed_mfp_e47528_3qa75alaserjet_managed_mfp_e72430_5cm71alaserjet_managed_mfp_e73140_5qk02acolor_laserjet_managed_mfp_e77825_x3a83alaserjet_managed_mfp_e826dn_3sj28alaserjet_managed_mfp_e731_3sj00alaserjet_managed_mfp_e72430_5cm72acolor_laserjet_managed_mfp_e87770_5qk03acolor_laserjet_managed_mfp_e87760_5qk03alaserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_flow_mfp_e67550_l3u70acolor_laserjet_managed_flow_e87770_5qk08alaserjet_managed_mfp_e82550_x3a79alaserjet_managed_flow_mfp_e73140_3sj01alaserjet_managed_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e52545c_3gy20acolor_laserjet_enterprise_mfp_6800_6qn37alaserjet_managed_flow_mfp_e62555_j8j80alaserjet_managed_flow_mfp_e72530_x3a66acolor_laserjet_managed_mfp_e78323_8gr95adigital_sender_flow_8500_fn2_l2762alaserjet_managed_mfp_e82560_z8z19scanjet_enterprise_flow_n9120_fn2_l2763alaserjet_managed_mfp_e73130_6bs58alaserjet_managed_flow_e82670_3sj30alaserjet_managed_flow_mfp_e73140_6bs58alaserjet_managed_mfp_e62655_3gy15apagewide_managed_color_mfp_p77950_2gp23apagewide_managed_color_mfp_p77940_y3z64alaserjet_managed_mfp_e82550du_5fm76apagewide_managed_color_mfp_e77650_j7z13acolor_laserjet_managed_flow_mfp_e77830_z8z05alaserjet_managed_mfp_e62555_j8j66alaserjet_managed_flow_e82650_3sj07alaserjet_managed_flow_mfp_e73130_5qk02acolor_laserjet_managed_flow_e87750_3sj37acolor_laserjet_managed_flow_mfp_e77822_z8z04apagewide_managed_color_mfp_p77940_2gp26alaserjet_enterprise_mfp_m430_3pz55acolor_laserjet_managed_mfp_e87760_3sj22alaserjet_enterprise_m609_k0q20acolor_laserjet_managed_flow_mfp_e87660_z8z14alaserjet_managed_mfp_e82560du_5rc83alaserjet_managed_mfp_e82550_x3a72acolor_laserjet_managed_flow_mfp_e87660_x3a90alaserjet_managed_mfp_e62555_j8j73alaserjet_managed_mfp_e62665_3gy14alaserjet_managed_e60165_3gy10acolor_laserjet_managed_mfp_e77822_z8z0acolor_laserjet_enterprise_mfp_m681_j8a12alaserjet_managed_e40040_3pz35apagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_managed_flow_e87760_3sj19alaserjet_managed_flow_mfp_e82540_az8z20acolor_laserjet_managed_mfp_e87750_3sj22acolor_laserjet_managed_flow_mfp_e77822_x3a83alaserjet_managed_flow_mfp_e82540_x3a71alaserjet_managed_flow_mfp_e72525_z8z06acolor_laserjet_managed_mfp_e87740_3sj21alaserjet_managed_flow_mfp_e62575_j8j73acolor_laserjet_managed_flow_mfp_e78630_5qk18acolor_laserjet_managed_flow_mfp_e87650_x3a90acolor_laserjet_managed_mfp_e77822_z8z02apagewide_enterprise_color_mfp_586_g1w41alaserjet_managed_flow_e82650_3sj30alaserjet_enterprise_m506_f2a69alaserjet_managed_mfp_e82540_x3a71acolor_laserjet_managed_mfp_e87750_5qk03acolor_laserjet_managed_flow_e87770_3sj38alaserjet_managed_mfp_e82550_z8z19color_laserjet_managed_mfp_e78330_8gr96alaserjet_enterprise_flow_mfp_m633_j8j78alaserjet_managed_mfp_e826dn_3sj09acolor_laserjet_enterprise_mfp_6800_6qn35alaserjet_managed_e82660_3sj09alaserjet_managed_mfp_e73130_6bs57acolor_laserjet_managed_mfp_e67550_l3u69alaserjet_managed_mfp_e82560du_5fm76acolor_laserjet_enterprise_x55745_6qp97acolor_laserjet_enterprise_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e877_5qk03alaserjet_managed_flow_mfp_e826z_3sj09alaserjet_managed_e50145_1pu52acolor_laserjet_managed_mfp_e78625_5qj94acolor_laserjet_managed_mfp_e786_3sj12alaserjet_managed_flow_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e87740_3sj37acolor_laserjet_managed_mfp_e78223-e78228_8gs36alaserjet_managed_flow_mfp_e82540_z8z18alaserjet_enterprise_m612_7ps88acolor_laserjet_managed_m553_b5l24acolor_laserjet_managed_mfp_e87770_3sj19alaserjet_enterprise_m507_1pv86alaserjet_managed_mfp_e72425_5cm68acolor_laserjet_enterprise_m555_7zu81acolor_laserjet_managed_mfp_e877_3sj35acolor_laserjet_managed_mfp_e78223-e78228_8gs15acolor_laserjet_managed_mfp_e78635_5qj90acolor_laserjet_managed_mfp_m577_b5l49apagewide_managed_color_mfp_p77940_y3z66alaserjet_managed_mfp_e730_5qj87acolor_laserjet_managed_e65060_l3u55alaserjet_managed_mfp_e82550_x3a82apagewide_enterprise_color_flow_mfp_586z_g1w41acolor_laserjet_managed_mfp_e87650_x3a87apagewide_enterprise_color_556_g1w46vlaserjet_managed_flow_mfp_e82540_x3a68alaserjet_managed_m506_f2a70alaserjet_managed_mfp_e73025_3sj03acolor_laserjet_managed_mfp_e77830_x3a78acolor_laserjet_managed_flow_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e87640_x3a87acolor_laserjet_enterprise_mfp_x57945_49k97avlaserjet_managed_mfp_e73030_3sj04acolor_laserjet_managed_mfp_e78330_8pe98acolor_laserjet_managed_mfp_e78625_3sj11alaserjet_managed_mfp_e73130_5qk02acolor_laserjet_managed_mfp_e78635_3sj33apagewide_managed_color_flow_mfp_e58650z_l3u43alaserjet_enterprise_m507_1pv89alaserjet_managed_flow_mfp_e62675_3gy14acolor_laserjet_managed_flow_mfp_e77825_z8z0alaserjet_managed_mfp_e82550du_5cm59alaserjet_managed_mfp_e82550du_5fm77alaserjet_managed_mfp_e82550_x3a71alaserjet_managed_flow_mfp_e731_3sj00alaserjet_managed_mfp_e72530_x3a66acolor_laserjet_managed_flow_mfp_e78625_3sj32acolor_laserjet_managed_mfp_e87660_z8z13apagewide_managed_color_mfp_p77960_2gp26acolor_laserjet_managed_flow_mfp_e77825_z8z05acolor_laserjet_managed_mfp_e87760_3sj21alaserjet_managed_mfp_e72425_5cm69alaserjet_enterprise_flow_mfp_m632_j8j71alaserjet_managed_mfp_e62555_j8j80acolor_laserjet_managed_mfp_e87640du-e87660du_5rc86acolor_laserjet_managed_e85055_t3u66acolor_laserjet_managed_mfp_e87770_3sj38alaserjet_enterprise_mfp_m632_j8j71acolor_laserjet_enterprise_m751_t3u43alaserjet_managed_flow_mfp_e826z_3sj07alaserjet_managed_flow_e82650_5qk13alaserjet_managed_flow_mfp_e826z_3sj30acolor_laserjet_managed_flow_mfp_e77822_z8z00acolor_laserjet_managed_flow_mfp_e78630_3sj32alaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_managed_e60075_m0p36alaserjet_managed_flow_e82660_3sj29acolor_laserjet_managed_flow_e87770_3sj22apagewide_managed_color_mfp_p77440_y3z60acolor_laserjet_managed_mfp_e77825_z8z02apagewide_managed_color_mfp_p77960_2gp23acolor_laserjet_managed_flow_e87750_3sj21alaserjet_managed_mfp_e73140_6bs59acolor_laserjet_managed_e65160_3gy03alaserjet_managed_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e87770_3sj37acolor_laserjet_managed_flow_mfp_e87660_x3a92acolor_laserjet_managed_mfp_e78223-e78228_19gsawlaserjet_managed_flow_mfp_e72535_x3a59alaserjet_managed_flow_mfp_e82560_x3a75acolor_laserjet_enterprise_mfp_m776_t3u55alaserjet_managed_flow_mfp_e82550_x3a74acolor_laserjet_enterprise_flow_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e87640du-e87660du_5fm82acolor_laserjet_enterprise_6701_6qn33acolor_laserjet_enterprise_mfp_5800_6qn30acolor_laserjet_enterprise_flow_mfp_6800_6qn36acolor_laserjet_managed_mfp_e877_5qk08alaserjet_managed_flow_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e77830_x3a77alaserjet_managed_flow_mfp_e73135_5qk02alaserjet_managed_mfp_e62565_j8j73apagewide_managed_color_mfp_p77950_2gp26acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20alaserjet_managed_e82660_3sj28alaserjet_managed_mfp_e731_5qj98apagewide_managed_color_mfp_p77940_y3z61alaserjet_managed_e82650_5qk09alaserjet_managed_mfp_e62565_j8j80alaserjet_managed_e82660_3sj08acolor_laserjet_managed_flow_mfp_e78635_5qj94acolor_laserjet_managed_mfp_e87750_3sj35acolor_laserjet_managed_mfp_e87750_3sj37acolor_laserjet_managed_flow_e87770_3sj37acolor_laserjet_managed_mfp_e78635_3sj11alaserjet_enterprise_mfp_m527_f2a77alaserjet_managed_flow_e82650_5qk09acolor_laserjet_managed_mfp_e87650_x3a86alaserjet_enterprise_mfp_m635_7ps97alaserjet_managed_mfp_e826dn_5qk09acolor_laserjet_managed_flow_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e87750_5qk08apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_enterprise_5700_49k98alaserjet_enterprise_flow_mfp_m636_7pt01alaserjet_managed_mfp_e82560du_5fm77alaserjet_managed_flow_e82670_5qk09alaserjet_managed_flow_mfp_e72535_x3a62alaserjet_enterprise_m611_7ps85acolor_laserjet_enterprise_6701_58m42alaserjet_enterprise_mfp_m527_f2a78acolor_laserjet_managed_mfp_e78323_8pe98alaserjet_managed_flow_mfp_e731_5qk02alaserjet_managed_mfp_e72535_z8z010alaserjet_managed_flow_mfp_e72530_x3a59apagewide_managed_color_mfp_p77950_5zn99apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e82560_az8z20acolor_laserjet_managed_flow_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87640du-e87660du_5cm64alaserjet_enterprise_flow_mfp_m632_j8j70alaserjet_managed_flow_e82660_3sj30alaserjet_managed_mfp_e62655_3gy18alaserjet_managed_mfp_e72530_z8z011apagewide_managed_color_mfp_p77940_2gp25acolor_laserjet_managed_mfp_e786_5qk18acolor_laserjet_managed_mfp_e87770_3sj35apagewide_enterprise_color_mfp_586_g1w40alaserjet_managed_mfp_e82560_z8z18acolor_laserjet_enterprise_mfp_m480_3qa55acolor_laserjet_managed_flow_mfp_e87660_z8z13acolor_laserjet_enterprise_flow_mfp_6800_49k84acolor_laserjet_managed_m553_b5l38alaserjet_managed_mfp_e72525_x3a62alaserjet_managed_e82660_3sj30alaserjet_managed_mfp_e52645_1ps55acolor_laserjet_managed_mfp_e78630_3sj32acolor_laserjet_managed_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e77830_z8z0alaserjet_managed_mfp_e82550_x3a74acolor_laserjet_managed_mfp_e87640du-e87660du_5cm63acolor_laserjet_managed_mfp_e877_3sj38alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_e72530_x3a65acolor_laserjet_enterprise_m554_7zu79acolor_laserjet_enterprise_m555_7zu79acolor_laserjet_enterprise_mfp_m578_7zu87alaserjet_managed_flow_mfp_e72535_z8z07alaserjet_managed_flow_mfp_m527z_f2a80alaserjet_managed_mfp_e72425_5rc90alaserjet_enterprise_flow_mfp_m635_7ps98acolor_laserjet_enterprise_m553_b5l38alaserjet_managed_flow_mfp_e73130_6bs58alaserjet_enterprise_mfp_m635_7ps98apagewide_managed_color_mfp_e77650_j7z14acolor_laserjet_managed_mfp_e77822_x3a78alaserjet_managed_flow_mfp_e62555_j8j66acolor_laserjet_managed_mfp_e87650_z8z13alaserjet_managed_mfp_e62565_j8j66alaserjet_managed_mfp_e73130_3sj00alaserjet_managed_mfp_e82540_x3a74alaserjet_managed_e82670_3sj30apagewide_managed_color_flow_mfp_e77650z_j7z07acolor_laserjet_managed_flow_mfp_e77825_x3a84alaserjet_enterprise_mfp_m528_1pv64acolor_laserjet_managed_flow_mfp_e87640_x3a92acolor_laserjet_managed_mfp_e78330_8gs01acolor_laserjet_managed_flow_e87740_3sj20acolor_laserjet_managed_mfp_e77830_z8z04alaserjet_managed_mfp_e82540du_5fm76alaserjet_managed_mfp_e72535_x3a65acolor_laserjet_enterprise_m652_j7z98acolor_laserjet_managed_mfp_e87660_x3a92acolor_laserjet_managed_flow_e87750_3sj38acolor_laserjet_managed_m553_b5l26alaserjet_managed_mfp_e731_6bs59acolor_laserjet_managed_flow_e87740_5qk08alaserjet_managed_e82650_3sj29acolor_laserjet_managed_mfp_e87770_3sj20acolor_laserjet_managed_flow_e87750_3sj35acolor_laserjet_managed_e65150_3gy04alaserjet_managed_flow_mfp_e62575_j8j80alaserjet_managed_mfp_e72530_z8z07acolor_laserjet_managed_mfp_e87770_5qk08alaserjet_managed_flow_mfp_e73135_6bs57acolor_laserjet_managed_flow_mfp_e77822_x3a77alaserjet_managed_mfp_e62665_3gy18acolor_laserjet_managed_flow_mfp_e786_3sj34acolor_laserjet_managed_mfp_e87740_5qk20alaserjet_enterprise_mfp_m528_1pv67apagewide_managed_color_flow_mfp_e77660z_j7z13alaserjet_managed_m506_f2a67acolor_laserjet_managed_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e78330_8gr95acolor_laserjet_enterprise_m554_7zu78acolor_laserjet_managed_mfp_e87750_3sj20acolor_laserjet_managed_mfp_e87640_z8z15alaserjet_managed_mfp_e82550_z8z18acolor_laserjet_enterprise_m553_b5l39acolor_laserjet_managed_mfp_e77825_z8z05alaserjet_managed_mfp_e82560du_5cm59acolor_laserjet_managed_flow_mfp_e57540_3gy25alaserjet_managed_flow_mfp_e72525_z8z011alaserjet_managed_flow_mfp_e72530_z8z08acolor_laserjet_enterprise_m553_b5l24acolor_laserjet_managed_flow_mfp_e78630_5qj90alaserjet_managed_flow_mfp_e82550_z8z19laserjet_managed_e60065_m0p33alaserjet_managed_flow_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e87660_x3a89alaserjet_managed_mfp_e73135_6bs59acolor_laserjet_enterprise_flow_mfp_m681_j8a11acolor_laserjet_enterprise_6700_58m42acolor_laserjet_managed_mfp_e87740_3sj20acolor_laserjet_managed_mfp_e87640_x3a93aCertain HP Enterprise LaserJet, LaserJet Managed printers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-7132
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.4||MEDIUM
EPSS-0.17% / 37.98%
||
7 Day CHG~0.00%
Published-23 Apr, 2020 | 17:47
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential security vulnerability has been identified in HPE Onboard Administrator. The vulnerability could be remotely exploited to allow Reflected Cross Site Scripting. HPE has made the following software updates and mitigation information to resolve the vulnerability in HPE Onboard Administrator. * OA 4.95 (Linux and Windows).

Action-Not Available
Vendor-n/aHP Inc.
Product-onboard_administratorHPE Onboard Administrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-4578
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-10 Sep, 2020 | 16:50
Updated-16 Sep, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 184433.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kernelwebsphere_application_serverihp-uxwindowsz\/osaixWebSphere Application Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-46846
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.4||MEDIUM
EPSS-0.14% / 34.40%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 16:06
Updated-02 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)HP Inc.
Product-proliant_ml350_gen10_serverproliant_xl190r_gen10_serverproliant_xl290n_gen10_plus_serverstoreeasy_1460_storagestoreeasy_1660_expanded_storageproliant_e910_server_bladeproliant_xl170r_gen10_serverproliant_xl270d_gen10_serverstoreeasy_1560_storageapollo_6500_gen10_plus_system3par_service_processorproliant_dl380_gen10_serverapollo_4200_gen10_serverproliant_ml110_gen10_serverapollo_4510_gen10_systemproliant_dl325_gen10_serverintegrated_lights-out_5_firmwareproliant_e910t_server_bladeproliant_xl645d_gen10_plus_serverproliant_xl450_gen10_serverproliant_dx385_gen10_plus_serverproliant_dl580_gen10_serverstoreeasy_1660_storagestoreeasy_1860_storageproliant_dl120_gen10_serverapollo_2000_gen10_plus_systemproliant_microserver_gen10proliant_dl325_gen10_plus_serverproliant_m750_server_bladeproliant_xl675d_gen10_plus_serverproliant_dl160_gen10_serverproliant_ml30_gen10_serverproliant_xl220n_gen10_plus_serverproliant_dl560_gen10_serverproliant_bl460c_gen10_server_bladestorage_file_controllerproliant_microserver_gen10_plusproliant_dl20_gen10_serverproliant_dl180_gen10_serverproliant_dl385_gen10_serverproliant_dl385_gen10_plus_serverproliant_xl230k_gen10_serverapollo_r2000_chassisproliant_dl360_gen10_serverintegrated_lights-out_5HPE Integrated Lights-Out 5
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-2364
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-3.5||LOW
EPSS-0.19% / 41.41%
||
7 Day CHG~0.00%
Published-19 Jul, 2013 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.2.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-8953
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.4||MEDIUM
EPSS-0.31% / 53.49%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Cross-Site Scripting (XSS) vulnerability in HPE LoadRunner v12.53 and earlier and HPE Performance Center version v12.53 and earlier was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-performance_centerloadrunnerLoadRunner and Performance Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-8991
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.4||MEDIUM
EPSS-0.30% / 52.82%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE has identified a cross site scripting (XSS) vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-centralview_fraud_risk_managementHPE CentralView Fraud Risk Management
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-14359
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
CVSS Score-5.4||MEDIUM
EPSS-0.24% / 46.86%
||
7 Day CHG~0.00%
Published-03 Nov, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MFSBGN03788 rev.1 - HPE Performance Center, Remote Cross-Site Scripting (XSS)

A potential security vulnerability has been identified in HPE Performance Center versions 12.20. The vulnerability could be remotely exploited to allow cross-site scripting.

Action-Not Available
Vendor-Micro Focus International LimitedHP Inc.
Product-performance_centerHPE Performance Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 247
  • 248
  • Next
Details not found