6 results (0.007 seconds)

CVSS: 9.3EPSS: 91%CPEs: 52EXPL: 0

Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. Desbordamiento de búfer basado en pila en Message Queuing Server (Cam.exe) en CA (formalmente Computer Associates) Message Queuing (CAM / CAFT) software anterior a 1.11 construccion 54_4 sobre Windows y NetWare, utilizado en CA Advantage Data Transport, eTrust Admin, ciertos productos BrightStor, ciertos productos CleverPath, y ciertos productos Unicenter, permite a atacantes remotos ejecutar código de su elección a través de un mensaje manipulado en el puerto TCP 3104. • http://secunia.com/advisories/26190 http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809 http://www.iss.net/threats/272.html http://www.securityfocus.com/archive/1/474602/100/0/threaded http://www.securityfocus.com/bid/25051 http://www.securitytracker.com/id?1018449 http://www.vupen.com/english/advisories/2007/2638 https://exchange.xforce.ibmcloud.com/vulnerabilities/32234 •

CVSS: 4.1EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in cube.exe in the GINA component for CA (Computer Associates) eTrust Admin 8.1.0 through 8.1.2 allows attackers with physical interactive or Remote Desktop access to bypass authentication and gain privileges via the password reset interface. Vulnerabilidad no especificada en cube.exe del componente GIN para CA (Computer Associates) eTrust Admin 8.1.0 hasta 8.1.2 permite a atacantes con acceso físico interactivo o Escritorio Remoto evitar la autenticación y obtener privilegios a través de la interfaz de restauración de contraseña. • http://secunia.com/advisories/24441 http://securityreason.com/securityalert/2404 http://www.osvdb.org/32722 http://www.securityfocus.com/archive/1/462312/100/0/threaded http://www.securityfocus.com/bid/22885 http://www.securitytracker.com/id?1017740 http://www.vupen.com/english/advisories/2007/0885 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35145 https://exchange.xforce.ibmcloud.com/vulnerabilities/32887 •

CVSS: 10.0EPSS: 4%CPEs: 49EXPL: 0

Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field. • http://marc.info/?l=full-disclosure&m=113803349715927&w=2 http://secunia.com/advisories/18591 http://securityreason.com/securityalert/380 http://securitytracker.com/id?1015526 http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 http://www.osvdb.org/22688 http://www.securityfocus.com/archive/1/423288/100/0/threaded http://www.securityfocus.com/archive/1/423403/100/0/threaded http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 62EXPL: 0

Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. • http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.osvdb.org/18917 http://www.securityfocus.com/bid/14623 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 •

CVSS: 10.0EPSS: 95%CPEs: 62EXPL: 1

Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. • https://www.exploit-db.com/exploits/16825 http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.kb.cert.org/vuls/id/619988 http://www.osvdb.org/18916 http://www.securityfocus.com/bid/14622 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 - •