CVE-2011-2608
https://notcve.org/view.php?id=CVE-2011-2608
ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command. ovbbccb.exe versión 6.20.50.0 y otras versiones en OpenView Performance Agent versiones 4.70 y 5.0; y el Operations Agent versiones 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501 y 8.53, de HP; permite a los atacantes remotos eliminar archivos arbitrarios por medio de un nombre de ruta completo en el campo File en un comando Register. • http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt http://marc.info/?l=bugtraq&m=131188898632504&w=2 http://secunia.com/advisories/45079 http://securitytracker.com/id?1025715 http://www.securityfocus.com/bid/48481 https://exchange.xforce.ibmcloud.com/vulnerabilities/68269 • CWE-20: Improper Input Validation •
CVE-2007-3872 – HP OpenView - Operations OVTrace Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-3872
Multiple stack-based buffer overflows in the Shared Trace Service (OVTrace) service for HP OpenView Operations A.07.50 for Windows, and possibly earlier versions, allow remote attackers to execute arbitrary code via certain crafted requests. Múltiples desbordamientos de búfer basados en pila en el servicio Shared Trace Service (OVTrace) para el HP OpenView Operations A.07.50 bajo Windows y, posiblemente, versiones anteriores, permiten a atacantes remotos ejecutar código de su elección a través de ciertas peticiones manipuladas. • https://www.exploit-db.com/exploits/16429 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01106515 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109171 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109584 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109617 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp? •