5 results (0.006 seconds)

CVSS: 9.3EPSS: 91%CPEs: 52EXPL: 0

Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. Desbordamiento de búfer basado en pila en Message Queuing Server (Cam.exe) en CA (formalmente Computer Associates) Message Queuing (CAM / CAFT) software anterior a 1.11 construccion 54_4 sobre Windows y NetWare, utilizado en CA Advantage Data Transport, eTrust Admin, ciertos productos BrightStor, ciertos productos CleverPath, y ciertos productos Unicenter, permite a atacantes remotos ejecutar código de su elección a través de un mensaje manipulado en el puerto TCP 3104. • http://secunia.com/advisories/26190 http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809 http://www.iss.net/threats/272.html http://www.securityfocus.com/archive/1/474602/100/0/threaded http://www.securityfocus.com/bid/25051 http://www.securitytracker.com/id?1018449 http://www.vupen.com/english/advisories/2007/2638 https://exchange.xforce.ibmcloud.com/vulnerabilities/32234 •

CVSS: 10.0EPSS: 1%CPEs: 62EXPL: 0

Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. • http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.osvdb.org/18917 http://www.securityfocus.com/bid/14623 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 •

CVSS: 10.0EPSS: 95%CPEs: 62EXPL: 1

Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. • https://www.exploit-db.com/exploits/16825 http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.kb.cert.org/vuls/id/619988 http://www.osvdb.org/18916 http://www.securityfocus.com/bid/14622 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 - •

CVSS: 5.0EPSS: 1%CPEs: 57EXPL: 0

Unknown vulnerability in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows attackers to cause a denial of service via unknown vectors, aka the "CAM TCP port vulnerability." • http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.osvdb.org/18915 http://www.securityfocus.com/bid/14621 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 •

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 0

Unknown "potential system security vulnerability" in Computer Associates (CA) Unicenter Remote Control 5.0 through 5.2, and ControlIT 5.0 and 5.1, may allow attackers to gain privileges to the local system account. "vulnerabilidad potencial de seguridad de sistema" desconocida en Computer Associates (CA) Unicenter Remote Control 5.0 a 5.2, y ControlIT 5.0 y 5.1 puede permitir a atacantes ganar privilegios de la cuenta de sistema local. • http://support.ca.com/techbases/rp/urc5x-secnote.html http://www.secunia.com/advisories/10420 •