Known vulnerabilities in Hewlett Packard Enterprise Development LP HPE Service Manager

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Hewlett Packard Enterprise Development LP › HPE Service Manager

Known vulnerabilities in Hewlett Packard Enterprise Development LP HPE Service Manager

Vendor: Hewlett Packard Enterprise Development LP
Website: https://www.hpe.com/us/en/home.html
Total Security Bulletins: 9
9.31.2004 p2 7.11.720 p22 9.21.706 P9 9.34.2003 p2 9.33.3000 p3 9.40.1002 p1 9.34.4001 p4 9.21.755 P10 7.11.752 p23 9.21 9.51 9.50 9.41 9.40 9.35 9.34 9.33 9.32 9.31 9.30

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2023041108: Information disclosure in HP Software Service Manager Critical
Patched Exploited
11.04.2023
SB2023040713: Information disclosure in HP Service Manager Medium
Patched
07.04.2023
SB2023033050: Man-in-the-middle attack in HP Service Manager Medium
Patched
30.03.2023
SB2018051401: SQL-injection in HPE Service Manager Low
Patched
14.05.2018
SB2016071501: Arbitrary commands execution in HPE Service Manager in HPE Service Manager High
Patched
15.07.2016
SB2015040102: Information disclosure in HPE Service Manager Medium
Patched
01.04.2015
SB2015040103: Information disclosure in HPE Service Manager Medium
Patched
01.04.2015
SB2015012203: Multiple vulnerabilities in HP Service Manager Medium
Patched
22.01.2015
SB2013042902: Multiple vulnerabilities in HP Service Manager Medium
Patched
29.04.2013


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or