CVE-2018-8954
https://notcve.org/view.php?id=CVE-2018-8954
CA Workload Control Center before r11.4 SP6 allows remote attackers to execute arbitrary code via a crafted HTTP request. CA Workload Control Center en versiones anteriores a la r11.4 SP6 permite que los atacantes remotos ejecuten código arbitrario mediante una petición HTTP manipulada. • http://www.securityfocus.com/bid/103742 http://www.securitytracker.com/id/1040605 https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180329-01--security-notice-for-ca-workload-automation-ae.html • CWE-20: Improper Input Validation •
CVE-2006-6641
https://notcve.org/view.php?id=CVE-2006-6641
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server. Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versión de mantenimiento 4.71.001_179_060830, usado en múltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no actúa adecuadamente cuando múltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almacén de información, lo cual puede provocar que un usuario de Portal herede la sesión y credenciales de un usuario que está en otro servidor Portal. • http://secunia.com/advisories/23426 http://securitytracker.com/id?1017429 http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp http://www.osvdb.org/30854 http://www.securityfocus.com/archive/1/455041/100/0/threaded http://www.securityfocus.com/bid/21681 http://www.vupen.com/english/advisories/2006/5091 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876 •