9 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 57EXPL: 1

png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute. La función png_image_free en el archivo png.c en libpng versiones 1.6.x anteriores a 1.6.37, presenta un uso de la memoria previamente liberada porque la función png_image_free_function es llamada bajo png_safe_execute. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html http://www.securityfocus.com/bid/108098 https:/ • CWE-400: Uncontrolled Resource Consumption CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

The HP ProLiant SL Advanced Power Manager (SL-APM) with firmware before 1.20 does not properly validate users, which allows remote attackers to cause a denial of service via unspecified vectors. El HP ProLiant SL Advanced Power Manager (SL-APM) con el firmware anterior a v1.20 no valida correctamente los usuarios, lo que permite a atacantes remotos causar una denegación de servicio a través de vectores no especificados. • http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02950841 http://secunia.com/advisories/45521 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in HP Power Manager (HPPM) 4.3.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the logType parameter to Contents/exportlogs.asp, (2) the Id parameter to Contents/pagehelp.asp, or the (3) SORTORD or (4) SORTCOL parameter to Contents/applicationlogs.asp. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en HP Power Manager(HPPM)v4.3.2 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de los parámetros (1) logType de Contents/exportlogs.asp, (2) Id de Contents/pagehelp.asp, o (3) SORTORD o(4) SORTCOL de Contents/applicationlogs.asp. NOTA : algunos de estos detalles han sido obtenidos de información de terceros . • http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html http://secunia.com/advisories/43058 http://www.securityfocus.com/bid/46830 https://exchange.xforce.ibmcloud.com/vulnerabilities/66035 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Cross-site request forgery (CSRF) vulnerability in HP Power Manager (HPPM) 4.3.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en HP Power Manager (HPPM) v4.3.2 y anteriores, permite a atacantes remotos secuestrar la autenticación de los administradores durante las peticiones de creación de nuevas cuentas administrativas. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131 http://osvdb.org/70836 http://secunia.com/advisories/43058 http://www.securityfocus.com/bid/46258 http://www.securitytracker.com/id?1025032 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 57%CPEs: 5EXPL: 0

Stack-based buffer overflow in HP Power Manager (HPPM) before 4.3.2 allows remote attackers to execute arbitrary code via a long Login variable to the management web server. Un desbordamiento de búfer en la región stack de la memoria en HP Power Manager (HPPM) anterior a versión 4.3.2, permite a los atacantes remotos ejecutar código arbitrario por medio de una variable Login larga en el servidor web de administración. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Power Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of URL parameters when posting to the login form of the web based management web server. Proper bounds checking is not applied when parsing the Login variable which can result in an exploitable stack overflow. • http://marc.info/?l=bugtraq&m=129251322532373&w=2 http://secunia.com/advisories/42644 http://www.securitytracker.com/id?1024902 http://www.zerodayinitiative.com/advisories/ZDI-10-292 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •