Page 2 of 8 results (0.010 seconds)

CVSS: 10.0EPSS: 40%CPEs: 6EXPL: 0

Multiple buffer overflows in the QIP Server Service (aka qipsrvr.exe) in LANDesk Management Suite, Security Suite, and Server Manager 8.8 and earlier allow remote attackers to execute arbitrary code via a crafted heal request, related to the StringToMap and StringSize arguments. Múltiples desbordamientos del búfer en el Servicio Servidor QIP (también conocido como qipsrvr.exe) en LANDesk Management Suite, Security Suite y Server Manager 8.8 y anteriores; permiten a atacantes remotos ejecutar código de su elección a través de una solicitud de cierre manipulada. Está relacionado con los argumentos StringToMap y StringSize. • http://community.landesk.com/support/docs/DOC-3276 http://dvlabs.tippingpoint.com/advisory/TPTI-08-06 http://secunia.com/advisories/31888 http://securityreason.com/securityalert/4269 http://www.kb.cert.org/vuls/id/538011 http://www.securityfocus.com/archive/1/496369/100/0/threaded http://www.securityfocus.com/bid/31193 http://www.securitytracker.com/id?1020888 http://www.vupen.com/english/advisories/2008/2588 https://exchange.xforce.ibmcloud.com/vulnerabilities/45154 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Directory traversal vulnerability in the PXE TFTP Service (PXEMTFTP.exe) in LANDesk Management Suite (LDMS) 8.7 SP5 and earlier and 8.8 allows remote attackers to read arbitrary files via unspecified vectors. Vulnerabilidad de salto de directorio en PXE TFTP Service (PXEMTFTP.exe) de LANDesk Management Suite (LDMS) 8.7 SP5 y anteriores y 8.8 permite a atacantes remotos leer archivos de su elección a través de vectores no especificados. • http://community.landesk.com/support/docs/DOC-2659 http://secunia.com/advisories/29324 http://www.securityfocus.com/bid/28535 http://www.securitytracker.com/id?1019748 http://www.vupen.com/english/advisories/2008/1051/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41562 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 94%CPEs: 1EXPL: 4

Stack-based buffer overflow in the Alert Service (aolnsrvr.exe) in LANDesk Management Suite 8.7 allows remote attackers to execute arbitrary code via a crafted packet to port 65535/UDP. Desbordamiento de búfer en el Servicio de Alerta (aolnsrvr.exe) en LANDesk Management Suite 8.7 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal al puerto 65535/UDP. • https://www.exploit-db.com/exploits/29853 https://www.exploit-db.com/exploits/16457 http://kb.landesk.com/display/4n/kb/article.asp?aid=4142 http://osvdb.org/34964 http://secunia.com/advisories/24892 http://www.securityfocus.com/archive/1/465643/100/0/threaded http://www.securityfocus.com/bid/23483 http://www.securitytracker.com/id?1017912 http://www.tippingpoint.com/security/advisories/TSRT-07-04.html http://www.vupen.com/english/advisories/2007/1391 https:// •