Page 2 of 8 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

The AdminUI in HPE Operations Manager (OM) before 9.21.130 on Linux, Unix, and Solaris allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. El AdminUI en HPE Operations Manager (OM) en versiones anteriores a 9.21.130 en Linux, Unix y Solaris permite a atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado, relacionado con la librería Apache Commons Collections (ACC). • http://www.securityfocus.com/bid/92122 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05206507 • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 91%CPEs: 4EXPL: 5

vmtadmin.cgi in VMTurbo Operations Manager before 4.6 build 28657 allows remote attackers to execute arbitrary commands via shell metacharacters in the fileDate parameter in a DOWN call. vmtadmin.cgi en VMTurbo Operations Manager anterior a 4.6 build 28657 permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres de shell en el parámetro fileDate en una llamada DOWN. • https://www.exploit-db.com/exploits/34335 http://disse.cting.org/2014/07/30/vmturbo-operation-manager-remote-command-execution http://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html http://secunia.com/advisories/58880 http://secunia.com/secunia_research/2014-8 http://www.exploit-db.com/exploits/34335 http://www.osvdb.org/109572 http://www.securityfocus.com/bid/69225 https://exchange.xforce.ibmcloud.com/vulnerabilities/95319 http •

CVSS: 5.0EPSS: 17%CPEs: 2EXPL: 3

Directory traversal vulnerability in cgi-bin/help/doIt.cgi in VMTurbo Operations Manager before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the xml_path parameter. Vulnerabilidad de salto de directorio en cgi-bin/help/doIt.cgi en VMTurbo Operations Manager anterior a 4.6 permite a atacantes remotos leer archivos arbitrarios a través de un .. (punto punto) en el parámetro xml_path. • https://www.exploit-db.com/exploits/33334 http://osvdb.org/show/osvdb/106776 http://packetstormsecurity.com/files/126550/VM-Turbo-Operations-Manager-4.5.x-Directory-Traversal.html http://www.exploit-db.com/exploits/33334 http://www.securityfocus.com/archive/1/532061/100/0/threaded http://www.securityfocus.com/bid/67292 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •