cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-30906,https://securityvulnerability.io/vulnerability/CVE-2023-30906,Privilege Escalation Vulnerability in HPE Products,"This vulnerability allows local attackers to execute arbitrary code with elevated privileges, potentially compromising the security of the affected HPE Software. Exploitation of this flaw could lead to unauthorized access and control over sensitive system functions.",HP,HP Intelligent Provisioning (ip) For Gen9,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-07-18T14:15:00.000Z,0 CVE-2020-7205,https://securityvulnerability.io/vulnerability/CVE-2020-7205,,"A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the ""Boot Hole"" issue for HPE signed GRUB2 applications.",HP,"HP Intelligent Provisioning,HP Proliant Bl460c Gen9 Server Blade,HP Proliant Bl660c Gen9 Server,HP Proliant Dl180 Gen9 Server,HP Proliant Dl60 Gen9 Server,HP Proliant Dl80 Gen9 Server,HP Proliant Ml110 Gen9 Server,HP Proliant Ml150 Gen9 Server,HP Proliant Xl740f Gen9 Server,HP Proliant Xl750f Gen9 Server,HP Apollo 4200 Gen9 Server,HP Proliant Dl20 Gen9 Server,HP Proliant Dl560 Gen9 Server,HP Proliant Ml30 Gen9 Server,HP Proliant Ml350 Gen9 Server,HP Proliant Xl170r Gen9 Server,HP Proliant Xl190r Gen9 Server,HP Proliant Xl230a Gen9 Server,HP Proliant Xl250a Gen9 Server,HP Proliant Xl260a Gen9 Server,HP Proliant Xl450 Gen9 Server,HP Proliant Xl730f Gen9 Server,Proliant Se2160w Gen9 Server,HP Proliant M510 Server Cartridge,HP Proliant M710x Server Blade,HP Proliant Bl460c Gen10 Server Blade,HP Proliant Dl360 Gen10 Server,HP Proliant Dl380 Gen10 Server,HP Proliant Dl560 Gen10 Server,HP Proliant Dl580 Gen10 Server,HP Proliant Ml110 Gen10 Server,HP Proliant Microserver Gen10,HP Synergy 480 Gen10 Compute Module,HP Synergy 660 Gen10 Compute Module,HP Proliant Dl180 Gen10 Server,HP Proliant Dl160 Gen10 Server,HP Proliant Dl120 Gen10 Server,HP Proliant Xl270d Gen9 Special Server,HP Proliant Dl385 Gen10 Server,HP Synergy 660 Gen9 Compute Module,HP Synergy 480 Gen9 Compute Module,HP Proliant Ws460c Gen9 Graphics Server Blade,HP Proliant Dl580 Gen8 Server,HP Synergy 620 Gen9 Compute Module,HP Proliant Ml350 Gen10 Server,HP Proliant Dl580 Gen9 Server,HP Proliant Dl360 Gen9 Server,HP Proliant Xl170r Gen10 Server,HP Cloudline Cl2100 Gen10 Server,HP Cloudline Cl2200 Gen10 Server,HP Cloudline Cl3100 Gen9 Server,HP Cloudline Cl3150 Gen10 Server (amd),HP Proliant Ml10 Gen9 Server,HP Proliant Dl120 Gen9 Server,HP Proliant Dl380 Gen9 Server,HP Service Pack For Proliant,HP Proliant Dl160 Gen9 Server,HP Proliant Xl270d Gen10 Server,HP Cloudline Cl5800 Gen9 Server,HP Cloudline Cl5200 Gen9 Server,HP Cloudline Cl4100 Gen10 Server,HP Cloudline Cl3100 Gen10 Server,HP Apollo 4200 Gen10 Server,HP Proliant Dl325 Gen10 Server,HP Proliant Ml30 Gen10 Server,HP Proliant Dl20 Gen10 Server,HP Storeeasy 1000 Storage Gen9,HP Storeeasy 1000 Storage Gen10,HP Simplivity 380 Gen10,HP Simplivity 2600 Gen10,HP Cloudline Cl2600 Gen10 Server,HP Cloudline Cl2800 Gen10 Server,HP Proliant E910 Server Blade,HP Proliant M750 Server Blade,HP Proliant M710x-l Server Blade,HP Cloudline Cl5800 Gen10 Server,HP Proliant Microserver Gen10 Plus,HP Proliant Xl450 Gen10 Server,HP Proliant Xl230k Gen10 Server,HP Proliant Xl190r Gen10 Server,HP Smartstart Scripting Toolkit Software,HP Apollo 2000 Gen10 Plus System,HP Proliant Dl385 Gen10 Plus Server,HP Proliant Dl325 Gen10 Plus Server,HP Proliant Dx385 Gen10 Plus Server,HP Proliant Xl220n Gen10 Plus Server,HP Proliant Xl290n Gen10 Plus Server,HP Synergy 480 Gen10 Plus Compute Module,HP Proliant Xl925g Gen10 Plus 1u 4-node Configure-to-order Server,HP Proliant E910t Server Blade",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-07-30T17:27:10.000Z,0 CVE-2015-2135,https://securityvulnerability.io/vulnerability/CVE-2015-2135,,"Unspecified vulnerability in HP Intelligent Provisioning 1.00 through 1.62(a), 2.00, and 2.10 allows remote attackers to execute arbitrary code via unknown vectors.",HP,Intelligent Provisioning,,,0.014039999805390835,false,,false,false,false,,,false,false,,2015-08-31T20:00:00.000Z,0 CVE-2015-2111,https://securityvulnerability.io/vulnerability/CVE-2015-2111,,Unspecified vulnerability in HP Intelligent Provisioning 1.40 through 1.60 on Windows Server 2008 R2 and 2012 allows local users to obtain sensitive information via unknown vectors.,HP,Intelligent Provisioning,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-04-04T01:00:00.000Z,0