Page 62 of 315 results (0.007 seconds)

CVSS: 10.0EPSS: 12%CPEs: 6EXPL: 0

Multiple unspecified vulnerabilities in HP Intelligent Management Center (IMC) before 5.0 E0101P05 allow remote attackers to execute arbitrary code via crafted input, as demonstrated by an integer overflow and heap-based buffer overflow in img.exe for a crafted message packet. Múltiples vulnerabilidades en HP Intelligent Management Center (IMC) anterior a v5.0 E0101P05 permite a atacantes remotos ejecutar código arbitrario a través de una entrada manipulada, como se muestra a través de un desbordamiento de entero y un desbordamiento de búfer basado en memoria dinámica en img.exe para un paquete de mensaje manipulado. • http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459 http://zerodayinitiative.com/advisories/ZDI-12-164 •

CVSS: 10.0EPSS: 85%CPEs: 5EXPL: 0

Stack-based buffer overflow in iNodeMngChecker.exe in the User Access Manager (UAM) 5.0 before SP1 E0101P03 and Endpoint Admission Defense (EAD) 5.0 before SP1 E0101P03 components in HP Intelligent Management Center (aka iNode Management Center) allows remote attackers to execute arbitrary code via a 0x0A0BF007 packet. Desbordamiento de búfer basado en pila en iNodeMngChecker.exe en el User Access Manager (UAM ) v5.0 antes de SP1 E0101P03 y Endpoint Admission Defense(EAD )v5.0 antes de SP1 E0101P03,componentes de HP Intelligent Management Center (también conocido como iNode Management Center), permite a atacantes remotos ejecutar código de su elección a través de un paquete 0x0A0BF007. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. • http://marc.info/?l=bugtraq&m=130982758604404&w=2 http://secunia.com/advisories/45129 http://securityreason.com/securityalert/8302 http://securitytracker.com/id?1025740 http://www.osvdb.org/73597 http://www.securityfocus.com/archive/1/518691/100/0/threaded http://www.securityfocus.com/bid/48527 http://www.zerodayinitiative.com/advisories/ZDI-11-232 https://exchange.xforce.ibmcloud.com/vulnerabilities/68348 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 17%CPEs: 1EXPL: 0

Integer overflow in img.exe in HP Intelligent Management Center (IMC) allows remote attackers to execute arbitrary code via a crafted length value in an a packet that triggers a heap-based buffer overflow, possibly related to an "recv" field. Desbordamiento de enteros en img.exe en HP Intelligent Management Center (IMC) permite a atacantes remotos ejecutar código arbitrario a través de un valor modificado de longitud de un paquete que provoca un desbordamiento de búfer basado en montículo, posiblemente relacionado con un campo "recv". • http://secunia.com/advisories/44748 http://securitytracker.com/id?1025583 http://www.securityfocus.com/bid/48065 http://zerodayinitiative.com/advisories/ZDI-11-170 https://exchange.xforce.ibmcloud.com/vulnerabilities/67738 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 26%CPEs: 3EXPL: 0

tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request. tftpserver.exe en HP Intelligent Management Center (IMC) v5.0 antes de E0101L02 permite a atacantes remotos crear o sobreescribir archivos y, posteriormente, ejecutar código de su elección, a través de una petición WRQ manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the tftpserver.exe component which listens by default on UDP port 69. When handling WRQ opcode types the server allows arbitrary file creation. Additionally, the server is configured to truncate/overwrite existing files. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750 http://securitytracker.com/id?1025519 http://www.securityfocus.com/bid/47789 http://www.zerodayinitiative.com/advisories/ZDI-11-161 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 36%CPEs: 3EXPL: 0

Use-after-free vulnerability in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long syslog packet, related to an exception handler. Vulnerabilidad liberar después de usar (Use-after-free) en HP Intelligent Management Center (IMC) v5.0 anterior a E0101L02 permite a atacantes remotos ejecutar código de su elección a través del paquete syslog, relacionado con una excepción del manejador. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The flaw exists within the imcsyslogdm.exe component which listens by default on UDP port 514. When handling a syslog packet having a size larger than 2048 bytes the process attempts to exit. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750 http://securitytracker.com/id?1025519 http://www.securityfocus.com/bid/47789 http://www.zerodayinitiative.com/advisories/ZDI-11-166 • CWE-399: Resource Management Errors •