Filtered by vendor Hp
Subscribe
Total
2438 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-4719 | 5 Hp, Ibm, Linux and 2 more | 8 Hp-ux, Aix, Mq and 5 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within runmqras data. | |||||
CVE-2019-4656 | 5 Hp, Ibm, Linux and 2 more | 8 Hp-ux, Aix, Mq and 5 more | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD is vulnerable to a denial of service attack that would allow an authenticated user to crash the queue and require a restart due to an error processing error messages. IBM X-Force ID: 170967. | |||||
CVE-2019-4619 | 5 Hp, Ibm, Linux and 2 more | 8 Hp-ux, Aix, Mq and 5 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 168862. | |||||
CVE-2019-4568 | 5 Hp, Ibm, Linux and 2 more | 7 Hp-ux, Aix, Mq and 4 more | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS could allow a remote attacker with intimate knowledge of the server to cause a denial of service when receiving data on the channel. IBM X-Force ID: 166629. | |||||
CVE-2019-4377 | 5 Hp, Ibm, Linux and 2 more | 7 Hp-ux, Aix, I and 4 more | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 reveals sensitive information from a stack trace that could be used in further attacks against the system. IBM X-Force ID: 162803. | |||||
CVE-2019-4322 | 5 Hp, Ibm, Linux and 2 more | 6 Hp-ux, Aix, Db2 and 3 more | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. IBM X-Force ID: 161202. | |||||
CVE-2019-4236 | 2 Hp, Ibm | 2 Hp-ux, Spectrum Protect | 2024-11-21 | 3.6 LOW | 4.4 MEDIUM |
A IBM Spectrum Protect 7.l client backup or archive operation running for an HP-UX VxFS object is silently skipping Access Control List (ACL) entries from backup or archive if there are more than twelve ACL entries associated with the object in total. As a result, it could allow a local attacker to restore or retrieve the object with incorrect ACL entries. IBM X-Force ID: 159418. | |||||
CVE-2019-4154 | 4 Hp, Ibm, Linux and 1 more | 5 Hp-ux, Aix, Db2 and 2 more | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. IBM X-Force ID: 158519. | |||||
CVE-2019-4102 | 5 Hp, Ibm, Linux and 2 more | 6 Hp-ux, Aix, Db2 and 3 more | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158092. | |||||
CVE-2019-3683 | 2 Hp, Suse | 3 Helion Openstack, Keystone-json-assignment, Openstack Cloud | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations. | |||||
CVE-2019-3486 | 1 Hp | 1 Arcsight Management Center | 2024-11-21 | 4.3 MEDIUM | 4.6 MEDIUM |
Mitigates a stored cross site scripting issue in ArcSight Security Management Center versions prior to 2.9.1 | |||||
CVE-2019-3485 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 4.3 MEDIUM | 4.6 MEDIUM |
Mitigates a stored cross site scripting issue in ArcSight Logger versions prior to 6.7.1 | |||||
CVE-2019-3484 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Mitigates a remote code execution issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-3483 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 6.8 MEDIUM | 6.5 MEDIUM |
Mitigates a potential information leakage issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-3482 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 6.8 MEDIUM | 6.5 MEDIUM |
Mitigates a directory traversal issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-3481 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 7.5 HIGH | 7.1 HIGH |
Mitigates a XML External Entity Parsing issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-3480 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Mitigates a stored/reflected XSS issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-3479 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Mitigates a potential remote code execution issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-2842 | 5 Canonical, Hp, Mcafee and 2 more | 6 Ubuntu Linux, Xp7 Command View, Epolicy Orchestrator and 3 more | 2024-11-21 | 4.3 MEDIUM | 3.7 LOW |
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | |||||
CVE-2019-2816 | 7 Canonical, Debian, Hp and 4 more | 13 Ubuntu Linux, Debian Linux, Xp7 Command View and 10 more | 2024-11-21 | 5.8 MEDIUM | 4.8 MEDIUM |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N). |