Page 45 of 229 results (0.013 seconds)

CVSS: 10.0EPSS: 83%CPEs: 7EXPL: 1

Stack-based buffer overflow in uam.exe in the User Access Manager (UAM) component in HP Intelligent Management Center (IMC) before 5.1 E0101P01 allows remote attackers to execute arbitrary code via vectors related to log data. Vulnerabilidad de desobrdamiento de búfer basado en pila en uam.exe en el componente User Access Manager (UAM) en HP Intelligent Management Center (IMC) antes de v5.1 E0101P01 permite a atacantes remotos ejecutar código de su elección a través de vectores relacionados con el registro de datos. • https://www.exploit-db.com/exploits/41710 http://zerodayinitiative.com/advisories/ZDI-12-171 https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03589863 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 12%CPEs: 6EXPL: 0

Multiple unspecified vulnerabilities in HP Intelligent Management Center (IMC) before 5.0 E0101P05 allow remote attackers to execute arbitrary code via crafted input, as demonstrated by an integer overflow and heap-based buffer overflow in img.exe for a crafted message packet. Múltiples vulnerabilidades en HP Intelligent Management Center (IMC) anterior a v5.0 E0101P05 permite a atacantes remotos ejecutar código arbitrario a través de una entrada manipulada, como se muestra a través de un desbordamiento de entero y un desbordamiento de búfer basado en memoria dinámica en img.exe para un paquete de mensaje manipulado. • http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459 http://zerodayinitiative.com/advisories/ZDI-12-164 •

CVSS: 10.0EPSS: 26%CPEs: 3EXPL: 0

tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request. tftpserver.exe en HP Intelligent Management Center (IMC) v5.0 antes de E0101L02 permite a atacantes remotos crear o sobreescribir archivos y, posteriormente, ejecutar código de su elección, a través de una petición WRQ manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the tftpserver.exe component which listens by default on UDP port 69. When handling WRQ opcode types the server allows arbitrary file creation. Additionally, the server is configured to truncate/overwrite existing files. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750 http://securitytracker.com/id?1025519 http://www.securityfocus.com/bid/47789 http://www.zerodayinitiative.com/advisories/ZDI-11-161 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 36%CPEs: 3EXPL: 0

Use-after-free vulnerability in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long syslog packet, related to an exception handler. Vulnerabilidad liberar después de usar (Use-after-free) en HP Intelligent Management Center (IMC) v5.0 anterior a E0101L02 permite a atacantes remotos ejecutar código de su elección a través del paquete syslog, relacionado con una excepción del manejador. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the imcsyslogdm.exe component which listens by default on UDP port 514. When handling a syslog packet having a size larger than 2048 bytes the process attempts to exit. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750 http://securitytracker.com/id?1025519 http://www.securityfocus.com/bid/47789 http://www.zerodayinitiative.com/advisories/ZDI-11-166 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 31%CPEs: 3EXPL: 0

tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a (1) large or (2) invalid opcode field, related to a function pointer table. tftpserver.exe en HP Intelligent Management Center (IMC) v5.0 antes de E0101L02 permite a atacantes remotos ejecutar código de su elección a través de un campo (1) grande o (2) de opcode no válido, relacionado con una tabla de puntero de función. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the tftpserver.exe component which listens by default on UDP port 69. When handling the opcode word of a packet the process uses this value as a lookup into a function pointer table. The process then calls into the calculated address. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750 http://securitytracker.com/id?1025519 http://www.securityfocus.com/bid/47789 http://www.zerodayinitiative.com/advisories/ZDI-11-165 • CWE-20: Improper Input Validation •