39 results (0.010 seconds)

CVSS: 10.0EPSS: 76%CPEs: 11EXPL: 0

Format string vulnerability in ovet_demandpoll.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via format string specifiers in the sel parameter. Vulnerabilidad de formato de cadena en ovet_demandpoll.exe en HP OpenView Network Node Manager (OV NNM) 7.01, 7.51 y 7.53 permite a atacantes remotos ejecutar código de su elección a través de especificadores de formato de cadenas en el parámetros "sel". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ovet_demandpoll.exe process. This process can be started by invoking the webappmon.exe CGI application through the webserver. • http://marc.info/?l=bugtraq&m=127360750704351&w=2 http://www.securityfocus.com/archive/1/511245/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-081 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 82%CPEs: 11EXPL: 0

Stack-based buffer overflow in the _OVParseLLA function in ov.dll in netmon.exe in Network Monitor in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via the sel parameter. Desbordamiento de búfer basado en pila en la función _OVParseLLA en ov.dll en netmon.exe en Network Monitor en HP OpenView Network Node Manager (OV NNM) 7.01, 7.51 y 7.53 permite a atacantes remotos ejecutar código de su elección a través del parámetro "sel". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Network Monitor (netmon.exe) daemon. This process can be started by invoking the webappmon.exe CGI application through the webserver. • http://marc.info/?l=bugtraq&m=127360750704351&w=2 http://www.securityfocus.com/archive/1/511247/100/0/threaded http://www.securityfocus.com/bid/40067 http://zerodayinitiative.com/advisories/ZDI-10-082 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 96%CPEs: 11EXPL: 1

Stack-based buffer overflow in the doLoad function in snmpviewer.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via the act and app parameters. Desbordamiento de búfer basado en pila en la función doLoad en snmpviewer.exe en HP OpenView Network Node Manager (OV NNM) 7.01, 7.51 y 7.53 permite a atacantes remotos ejecutar código de su elección a través de los parámetros "act" y "app". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the snmpviewer.exe CGI. The doLoad function in this process calls sprintf() with a %s format specifier and unsanitized user input retrieved from two separate POST variables (act and app). • https://www.exploit-db.com/exploits/17039 http://marc.info/?l=bugtraq&m=127360750704351&w=2 http://securityreason.com/securityalert/8157 http://www.securityfocus.com/archive/1/511248/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-083 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 96%CPEs: 11EXPL: 2

Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter. Desbordamiento de búfer basado en pila en etnnmdata.exe en HP OpenView Network Node Manager (OV NNM) 7.01, 7.51 y 7.53 permite a atacantes remotos ejecutar código de su elección mediante un parámetro MaxAge inválido. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getnnmdata.exe CGI. If this CGI is requested with an invalid MaxAge parameter a sprintf() call is made to log the error. • https://www.exploit-db.com/exploits/17042 https://www.exploit-db.com/exploits/14180 http://marc.info/?l=bugtraq&m=127360750704351&w=2 http://securityreason.com/securityalert/8153 http://www.securityfocus.com/archive/1/511241/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-084 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 97%CPEs: 11EXPL: 3

Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid iCount parameter. Desbordamiento de búfer basado en pila en etnnmdata.exe en HP OpenView Network Node Manager (OV NNM) 7.01, 7.51 y 7.53 permite a atacantes remotos ejecutar código de su elección mediante un parámetro iCount inválido. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getnnmdata.exe CGI. If this CGI is requested with an invalid iCount POST parameter a sprintf() call is made to log the error. • https://www.exploit-db.com/exploits/17040 https://www.exploit-db.com/exploits/14181 http://marc.info/?l=bugtraq&m=127360750704351&w=2 http://securityreason.com/securityalert/8154 http://www.exploit-db.com/exploits/14181 http://www.securityfocus.com/archive/1/511249/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-085 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •