2 results (0.010 seconds)

CVSS: 9.8EPSS: 4%CPEs: 6EXPL: 1

HPE iMC PLAT before 7.2 E0403P04, iMC EAD before 7.2 E0405P05, iMC APM before 7.2 E0401P04, iMC NTA before 7.2 E0401P01, iMC BIMS before 7.2 E0402P02, and iMC UAM_TAM before 7.2 E0405P05 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. HPE iMC PLAT en versiones anteriores a 7.2 E0403P04, iMC EAD en versiones anteriores a 7.2 E0405P05, iMC APM en versiones anteriores a 7.2 E0401P04, iMC NTA en versiones anteriores a 7.2 E0401P01, iMC BIMS en versiones anteriores a7.2 E0402P02 y iMC UAM_TAM en versiones anteriores a 7.2 E0405P05 permiten a atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado, relacionado con la librería Apache Commons Collections (ACC). • https://www.exploit-db.com/exploits/42756 http://www.securityfocus.com/bid/91739 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05200601 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 85%CPEs: 5EXPL: 0

Stack-based buffer overflow in iNodeMngChecker.exe in the User Access Manager (UAM) 5.0 before SP1 E0101P03 and Endpoint Admission Defense (EAD) 5.0 before SP1 E0101P03 components in HP Intelligent Management Center (aka iNode Management Center) allows remote attackers to execute arbitrary code via a 0x0A0BF007 packet. Desbordamiento de búfer basado en pila en iNodeMngChecker.exe en el User Access Manager (UAM ) v5.0 antes de SP1 E0101P03 y Endpoint Admission Defense(EAD )v5.0 antes de SP1 E0101P03,componentes de HP Intelligent Management Center (también conocido como iNode Management Center), permite a atacantes remotos ejecutar código de su elección a través de un paquete 0x0A0BF007. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. • http://marc.info/?l=bugtraq&m=130982758604404&w=2 http://secunia.com/advisories/45129 http://securityreason.com/securityalert/8302 http://securitytracker.com/id?1025740 http://www.osvdb.org/73597 http://www.securityfocus.com/archive/1/518691/100/0/threaded http://www.securityfocus.com/bid/48527 http://www.zerodayinitiative.com/advisories/ZDI-11-232 https://exchange.xforce.ibmcloud.com/vulnerabilities/68348 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •