4 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

07 Jul 2016 — IBM Power Hardware Management Console (HMC) 7.3 through 7.3.0 SP7, 7.9 through 7.9.0 SP3, 8.1 through 8.1.0 SP3, 8.2 through 8.2.0 SP2, 8.3 through 8.3.0 SP2, 8.4 through 8.4.0 SP1, and 8.5.0 allows physically proximate attackers to obtain root access via unspecified vectors. IBM Power Hardware Management Console (HMC) 7.3 hasta la versión 7.3.0 SP7, 7.9 hasta la versión 7.9.0 SP3, 8.1 hasta la versión 8.1.0 SP3, 8.2 hasta la versión 8.2.0 SP2, 8.3 hasta la versión 8.3.0 SP2, 8.4 hasta la versión 8.4.0 SP1 ... • http://www-01.ibm.com/support/docview.wss?uid=nas8N1021387 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

20 Jan 2009 — Unspecified vulnerability in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 has unknown impact and attack vectors. Vulnerabilidad no especificada en IBM Hardware Management Console (HMC) 7 release v3.2.0 SP1 tiene un impacto y vectores de ataque desconocidos. • http://osvdb.org/51432 •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 0

30 Jan 2008 — Unspecified vulnerability in the Pegasus CIM Server in IBM Hardware Management Console (HMC) 7 R3.2.0 allows remote attackers to cause a denial of service via unspecified vectors. Vulnerabilidad sin especificar en el servidor Pegasus CIM en IBM Hardware Management Console (HMC) 7 R3.2.0 permite a atacantes remotos provocar una denegación de servicio a través de vectores no especificados. • http://secunia.com/advisories/28667 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

10 Dec 2007 — Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via "some HMC commands." Múltiples vulnerabilidades no especificadas en IBM Hardware Management Console (HMC) 7 R3.2.0 permite a atacantes obtener privilegios mediante "algunos comandos HMC". • http://secunia.com/advisories/27961 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-264: Permissions, Privileges, and Access Controls •