7 results (0.010 seconds)

CVSS: 10.0EPSS: 20%CPEs: 17EXPL: 2

Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow. Error en la propiedad signedness de enteros en el archivo ovspmd.exe en HP OpenView Network Node Manager (OV NNM) versiones 8.01 y 7.53 y anteriores, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) o ejecutar código arbitrario por medio de una petición larga al puerto TCP 8886 que comienza con un determinado entero negativo, que pasa una comparación firmada y desencadena un desbordamiento de búfer en la región heap de la memoria. • https://www.exploit-db.com/exploits/31629 http://aluigi.altervista.org/adv/closedview-adv.txt http://aluigi.org/poc/closedview.zip http://marc.info/?l=bugtraq&m=121321155405849&w=2 http://secunia.com/advisories/29713 http://securitytracker.com/id?1019821 http://www.securityfocus.com/archive/1/493781/100/0/threaded http://www.securityfocus.com/bid/28689 http://www.vupen.com/english/advisories/2008/1159 https://exchange.xforce.ibmcloud.com/vulnerabilities/41737 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 95%CPEs: 3EXPL: 4

Stack-based buffer overflow in ovwparser.dll in HP OpenView Network Node Manager (OV NNM) 7.53, 7.51, and earlier allows remote attackers to execute arbitrary code via a long URI in an HTTP request processed by ovas.exe, as demonstrated by a certain topology/homeBaseView request. NOTE: some of these details are obtained from third party information. Un desbordamiento de búfer en la región stack de la memoria en la biblioteca ovwparser.dll en HP OpenView Network Node Manager (OV NNM) versiones 7.53, 7.51 y anteriores, permite a los atacantes remotos ejecutar código arbitrario por medio de un URI largo en una petición HTTP procesada por el archivo ovas.exe, como es demostrado por una determinada petición de topology/homeBaseView. NOTA: algunos de estos datos fueron obtenidos de la información de terceros. • https://www.exploit-db.com/exploits/5342 https://www.exploit-db.com/exploits/16774 http://marc.info/?l=bugtraq&m=121553626110871&w=2 http://secunia.com/advisories/29641 http://www.offensive-security.com/0day/hp-nnm-ov.py.txt http://www.securityfocus.com/bid/28569 http://www.securitytracker.com/id?1019782 http://www.vupen.com/english/advisories/2008/1085/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41600 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 18EXPL: 0

Memory leak in HP OpenView Network Node Manager (NNM) 6.2 and 6.4 allows remote attackers to cause a denial of service (memory exhaustion) via crafted TCP packets. • http://archives.neohapsis.com/archives/hp/2003-q4/0019.html http://www.securityfocus.com/bid/8859 https://exchange.xforce.ibmcloud.com/vulnerabilities/13467 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in Network Node Manager (NNM) 6.2 and earlier in HP OpenView allows a local user to execute arbitrary code, possibly via a buffer overflow in a long hostname or object ID. • http://www.kb.cert.org/vuls/id/782155 http://www.securityfocus.com/advisories/3585 http://www.securityfocus.com/advisories/3723 http://www.securityfocus.com/bid/3399 https://exchange.xforce.ibmcloud.com/vulnerabilities/7222 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 2

ovactiond in HP OpenView Network Node Manager (NNM) 6.1 and Tivoli Netview 5.x and 6.x allows remote attackers to execute arbitrary commands via shell metacharacters in a certain SNMP trap message. • https://www.exploit-db.com/exploits/20909 http://marc.info/?l=bugtraq&m=99201278704545&w=2 http://www.cert.org/advisories/CA-2001-24.html http://www.kb.cert.org/vuls/id/952171 http://www.securityfocus.com/bid/2845 •