语言:
https://www.zerodayinitiative.com/advisories/ZDI-11-003/
https://www.zerodayinitiative.com/advisories/ZDI-11-004/
https://www.zerodayinitiative.com/advisories/ZDI-11-005/
https://www.zerodayinitiative.com/advisories/ZDI-11-006/
https://www.zerodayinitiative.com/advisories/ZDI-11-007/
https://www.zerodayinitiative.com/advisories/ZDI-11-008/
https://www.zerodayinitiative.com/advisories/ZDI-11-009/
https://www.zerodayinitiative.com/advisories/ZDI-11-010/
https://www.zerodayinitiative.com/advisories/ZDI-11-011/
https://www.zerodayinitiative.com/advisories/ZDI-11-012/
严重性: Critical
ID: 51645
文件名: openview_nnm_execvp_nc.nasl
版本: 1.14
类型: remote
系列: CGI abuses
发布时间: 2011/1/21
最近更新时间: 2021/1/19
支持的传感器: Nessus
风险因素: High
分数: 7.4
风险因素: Critical
基本分数: 10
时间分数: 8.3
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
排除的 KB 项: Settings/disable_cgi_scanning
易利用性: No exploit is required
补丁发布日期: 2011/1/10
漏洞发布日期: 2010/7/20
Core Impact
Metasploit (HP OpenView NNM nnmRptConfig.exe schdParams Buffer Overflow)
CVE: CVE-2010-2703, CVE-2011-0261, CVE-2011-0262, CVE-2011-0263, CVE-2011-0264, CVE-2011-0265, CVE-2011-0266, CVE-2011-0267, CVE-2011-0268, CVE-2011-0269, CVE-2011-0270, CVE-2011-0271