Page 15 of 74 results (0.004 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

HP System Management Homepage (SMH) before 2.1.9 for Linux, when used with Novell eDirectory, assigns the eDirectory members to the root group, which allows remote authenticated eDirectory users to gain privileges. HP System Management Homepage (SMH) anterior a 2.1.9 para Linux, cuando se usa con Novel eDirectory, asigna a los miembros de eDirectory al grupo root, lo cual permite a usuarios de eDirectory autenticados remotamente obtener privilegios. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01072894 http://osvdb.org/37513 http://secunia.com/advisories/25689 http://www.securityfocus.com/bid/24486 http://www.securitytracker.com/id?1018256 http://www.vupen.com/english/advisories/2007/2232 https://exchange.xforce.ibmcloud.com/vulnerabilities/34900 •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 2.1.2 running on Linux and Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en HP System Management Homepage (SMH) en versiones anteriores a 2.1.2 corriendo en Linux y Windows permite a atacantes remotos inyectar secuencias de comandos (script) web o HTML de su elección a través de vectores sin especificar. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01056592 http://jvn.jp/jp/JVN%2319240523/index.html http://osvdb.org/36829 http://secunia.com/advisories/25493 http://www.kb.cert.org/vuls/id/292457 http://www.securityfocus.com/bid/24256 http://www.securitytracker.com/id?1018179 http://www.vupen.com/english/advisories/2007/2013 https://exchange.xforce.ibmcloud.com/vulnerabilities/34656 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

HP System Management Homepage (SMH) 2.1.3.132, when running on CompaqHTTPServer/9.9 on Windows, Linux, or Tru64 UNIX, and when "Trust by Certificates" is not enabled, allows remote attackers to bypass authentication via a crafted URL. • http://securitytracker.com/id?1015901 http://src.telindus.com/articles/hpsm_vulnerability.html http://www.securityfocus.com/archive/1/430688/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/25761 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Directory traversal vulnerability in HP System Management Homepage (SMH) 2.0.0 through 2.1.4 on Windows allows remote attackers to access certain files via unspecified vectors. • http://secunia.com/advisories/19059 http://securitytracker.com/id?1015692 http://www.securityfocus.com/archive/1/426345/100/0/threaded http://www.securityfocus.com/bid/16876 http://www.vupen.com/english/advisories/2006/0769 http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00601530 https://exchange.xforce.ibmcloud.com/vulnerabilities/24996 •