Security vulnerabilities in the HPE Integrated Lights-Out 2 (iLO 2) firmware could be exploited remotely to allow authentication bypass, code execution, and denial of service.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Integrated_lights-out_2_firmware | Hp | 2.29 (including) | 2.29 (including) |