5 results (0.027 seconds)

CVSS: 8.8EPSS: 0%CPEs: 724EXPL: 0

The web interface in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions before 3.17.02, allows remote authenticated users to execute arbitrary commands via a crafted request targeting vulnerable cgi endpoints. La interfaz web en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware anteriores a la 3.17.02, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de una solicitud manipulada dirigida a endpoints cgi vulnerables. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 •

CVSS: 8.8EPSS: 0%CPEs: 724EXPL: 0

The configuration functionality in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions through 3.17.02, allows remote authenticated users to execute arbitrary commands. La funcionalidad de configuración en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta la 3.17.02, permite a los usuarios autenticados remotamente ejecutar comandos arbitrarios. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.5EPSS: 0%CPEs: 724EXPL: 0

A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information. Un servidor web en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta 3.17.02, permite a usuarios remotos no autenticados realizar recorridos de directorio, revelando potencialmente información confidencial. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 542EXPL: 1

Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable. • https://github.com/risuxx/CVE-2023-34853 https://www.supermicro.com/Bios/softfiles/17136/X12DPG-QR_1.4b_X1.02.61_SUM2.10.0.zip. https://www.supermicro.com/en/support/security_BIOS_Aug_2023 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 332EXPL: 1

A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC. • https://blog.freax13.de/cve/cve-2023-35861 https://www.supermicro.com/en/products/motherboards https://www.supermicro.com/en/support/security_SMTP_Jun_2023 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •