Page 43 of 266 results (0.013 seconds)

CVSS: 10.0EPSS: 57%CPEs: 2EXPL: 0

A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. Se ha encontrado una vulnerabilidad de ejecución remota de código en HPE Intelligent Management Center (iMC) PLAT en su versión IMC Plat 7.3 E0504P2 y anteriores. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebDMServlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. • http://www.securityfocus.com/bid/101152 http://www.securitytracker.com/id/1039495 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 17%CPEs: 2EXPL: 0

A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT iMC Plat 7.3 E0504P2 and earlier was found. Se ha encontrado una vulnerabilidad de ejecución remota de código en HPE Intelligent Management Center (iMC) PLAT iMC Plat 7.3 E0504P2 y anteriores. This vulnerability allows remote attackers to rename arbitrary files on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mibFileServlet servlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securitytracker.com/id/1039495 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03782en_us • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

A Remote Denial of Service vulnerability in HPE Intelligent Management Center (iMC) PLAT version iMC Plat 7.3 E0504P2 was found. Se ha encontrado una vulnerabilidad de denegación de servicio (DoS) remota en HPE Intelligent Management Center (iMC) PLAT versión iMC Plat 7.3 E0504P2. This vulnerability allows remote attackers to delete arbitrary directories on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within mibFileServlet servlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securitytracker.com/id/1039495 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 92%CPEs: 2EXPL: 1

A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. Se ha encontrado una vulnerabilidad de ejecución remota de código en HPE Intelligent Management Center (iMC) PLAT en su versión IMC Plat 7.3 E0504P2 y anteriores. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebDMDebugServlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. • https://www.exploit-db.com/exploits/45952 http://www.securityfocus.com/bid/101152 http://www.securitytracker.com/id/1039495 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us https://github.com/pimps/ysoserial-modified/blob/master/src/main/java/ysoserial/payloads/JSON1.java https://www.zerodayinitiative.com/advisories/ZDI-17-832 • CWE-502: Deserialization of Untrusted Data •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

A Remote Denial of Service vulnerability in HPE Intelligent Management Center (iMC) PLAT version iMC Plat 7.3 E0504P2 was found. Se ha encontrado una vulnerabilidad de denegación de servicio (DoS) remota en HPE Intelligent Management Center (iMC) PLAT versión iMC Plat 7.3 E0504P2. This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within mibFileServlet servlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securitytracker.com/id/1039495 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •