4 results (0.006 seconds)

CVSS: 9.3EPSS: 91%CPEs: 52EXPL: 0

Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. Desbordamiento de búfer basado en pila en Message Queuing Server (Cam.exe) en CA (formalmente Computer Associates) Message Queuing (CAM / CAFT) software anterior a 1.11 construccion 54_4 sobre Windows y NetWare, utilizado en CA Advantage Data Transport, eTrust Admin, ciertos productos BrightStor, ciertos productos CleverPath, y ciertos productos Unicenter, permite a atacantes remotos ejecutar código de su elección a través de un mensaje manipulado en el puerto TCP 3104. • http://secunia.com/advisories/26190 http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809 http://www.iss.net/threats/272.html http://www.securityfocus.com/archive/1/474602/100/0/threaded http://www.securityfocus.com/bid/25051 http://www.securitytracker.com/id?1018449 http://www.vupen.com/english/advisories/2007/2638 https://exchange.xforce.ibmcloud.com/vulnerabilities/32234 •

CVSS: 7.5EPSS: 1%CPEs: 18EXPL: 0

Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server. Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versión de mantenimiento 4.71.001_179_060830, usado en múltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no actúa adecuadamente cuando múltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almacén de información, lo cual puede provocar que un usuario de Portal herede la sesión y credenciales de un usuario que está en otro servidor Portal. • http://secunia.com/advisories/23426 http://securitytracker.com/id?1017429 http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp http://www.osvdb.org/30854 http://www.securityfocus.com/archive/1/455041/100/0/threaded http://www.securityfocus.com/bid/21681 http://www.vupen.com/english/advisories/2006/5091 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876 •

CVSS: 10.0EPSS: 1%CPEs: 62EXPL: 0

Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. • http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.osvdb.org/18917 http://www.securityfocus.com/bid/14623 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 •

CVSS: 10.0EPSS: 95%CPEs: 62EXPL: 2

Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. • https://www.exploit-db.com/exploits/16825 http://secunia.com/advisories/16513 http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp http://www.kb.cert.org/vuls/id/619988 http://www.osvdb.org/18916 http://www.securityfocus.com/bid/14622 http://www.vupen.com/english/advisories/2005/1482 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/unicenter/cam_log_secu •