Security vulnerabilities in the HPE Integrated Lights-Out 2 (iLO 2) firmware could be exploited remotely to allow authentication bypass, code execution, and denial of service.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Integrated_lights-out_2_firmware | Hp | 2.29 (including) | 2.29 (including) |