Vulnerabilities (CVE)

Filtered by vendor Hp Subscribe
Filtered by product Universal Configuration Management Database
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-5440 1 Hp 1 Universal Configuration Management Database 2023-12-10 4.9 MEDIUM N/A
HP UCMDB 10.00 and 10.01 before 10.01CUP12, 10.10 and 10.11 before 10.11CUP6, and 10.2x before 10.21 allows local users to obtain sensitive information via unspecified vectors.
CVE-2013-6214 1 Hp 1 Universal Configuration Management Database 2023-12-10 4.0 MEDIUM N/A
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.
CVE-2014-2615 1 Hp 1 Universal Configuration Management Database 2023-12-10 7.5 HIGH N/A
Unspecified vulnerability in HP Universal CMDB 10.01 and 10.10 allows remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors, aka ZDI-CAN-2083.
CVE-2014-2616 1 Hp 1 Universal Configuration Management Database 2023-12-10 7.5 HIGH N/A
Unspecified vulnerability in HP Universal CMDB 10.01 and 10.10 allows remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors, aka ZDI-CAN-2091.
CVE-2014-2617 1 Hp 1 Universal Configuration Management Database 2023-12-10 10.0 HIGH N/A
Unspecified vulnerability in HP Universal CMDB 10.01 and 10.10 allows remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors, aka ZDI-CAN-2104.
CVE-2013-6215 1 Hp 1 Universal Configuration Management Database 2023-12-10 8.5 HIGH N/A
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.
CVE-2014-7883 1 Hp 1 Universal Configuration Management Database 2023-12-10 5.0 MEDIUM N/A
HP Universal CMDB (UCMDB) Probe 9.05, 10.01, and 10.11 enables the HTTP TRACE method, which allows remote attackers to obtain sensitive information by reading the headers of a response.