Page 40 of 501 results (0.009 seconds)

CVSS: 4.3EPSS: 2%CPEs: 119EXPL: 0

Unspecified vulnerability in multiple versions of Hitachi JP1/Automatic Job Management System 2 - View, JP1/Integrated Management - View, and JP1/Cm2/SNMP System Observer, allows remote attackers to cause a denial of service ("abnormal" termination) via vectors related to the display of an "invalid GIF file." Vulnerabilidad no especificada en múltiples versiones de Hitachi JP1/Automatic Job Management System 2 - View, JP1/Integrated Management - View, y JP1/Cm2/SNMP System Observer, permite a atacantes remotos causar una denegación de servicio (terminación anormal)a través de vectores relacionados con la visualización de un fichero GIF no válido. • http://osvdb.org/57832 http://secunia.com/advisories/36646 http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-016/index.html http://www.securityfocus.com/bid/36311 http://www.vupen.com/english/advisories/2009/2576 https://exchange.xforce.ibmcloud.com/vulnerabilities/53115 •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in HP-UX B.11.31, with AudFilter rules enabled, allows local users to cause a denial of service via unknown vectors. Vulnerabilidad no especificada en HP-UX B.11.31, con las reglas AudFilter habilitadas, permite a atacantes locales provocar una denegación de servicio mediante vectores desconocidos. • http://marc.info/?l=bugtraq&m=126996727024732&w=2 http://www.securityfocus.com/bid/39046 http://www.securitytracker.com/id?1023772 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11779 •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

The installation process for NFS/ONCplus B.11.31_08 and earlier on HP HP-UX B.11.31 changes the NFS_SERVER setting in the nfsconf file, which might allow remote attackers to obtain filesystem access via NFS requests. El proceso de instalación de NFS/ONCplus B.11.31_08 y versiones anteriores en HP HP-UX B.11.31 modifica la variable NFS_SERVER en el fichero nfsconf , lo que puede permitir a atacantes remotos la obtención de acceso al sistema de ficheros a través de peticiones NFS. • http://marc.info/?l=bugtraq&m=126962272413767&w=2 http://osvdb.org/63243 http://secunia.com/advisories/39111 http://securitytracker.com/id?1023758 http://www.securityfocus.com/bid/38982 http://www.vupen.com/english/advisories/2010/0731 https://exchange.xforce.ibmcloud.com/vulnerabilities/57216 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12025 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 1%CPEs: 3EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in HP Project and Portfolio Management Center (PPMC, formerly Mercury IT Governance) 7.1 through SP10 and 7.5 through SP3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en HP Project y Portfolio Management Center (PPMC, anteriormente Mercury IT Governance) v7.1 hasta el SP10 y 7.5 hasta el SP3 permiten a atacantes remotos inyectar codigo de script web o código HTML de su elección a través de vectores de ataque sin especificar. • http://marc.info/?l=bugtraq&m=126953216625011&w=2 http://secunia.com/advisories/39105 http://securitytracker.com/id?1023749 http://www.osvdb.org/63175 http://www.securityfocus.com/bid/38961 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in HP Enterprise Cluster Master Toolkit (ECMT) B.05.00 on HP-UX B.11.23 (11i v2) and HP-UX B.11.31 (11i v3) allows local users to gain access to an Oracle or Sybase database via unknown vectors. Vulnerabilidad inespecífica en HP Enterprise Cluster Master Toolkit (ECMT) B.05.00 en HP-UX B.11.23 (11i v2) y HP-UX B.11.31 (11i v3) permite a usuarios locales conseguir el acceso a las bases de datos Oracle o Sybase a través de vectores desconocidos. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01894850 http://secunia.com/advisories/38423 http://www.securityfocus.com/bid/38035 http://www.securitytracker.com/id?1023523 http://www.vupen.com/english/advisories/2010/0272 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12172 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8305 •