Language:
https://www.zerodayinitiative.com/advisories/ZDI-11-003/
https://www.zerodayinitiative.com/advisories/ZDI-11-004/
https://www.zerodayinitiative.com/advisories/ZDI-11-005/
https://www.zerodayinitiative.com/advisories/ZDI-11-006/
https://www.zerodayinitiative.com/advisories/ZDI-11-007/
https://www.zerodayinitiative.com/advisories/ZDI-11-008/
https://www.zerodayinitiative.com/advisories/ZDI-11-009/
https://www.zerodayinitiative.com/advisories/ZDI-11-010/
https://www.zerodayinitiative.com/advisories/ZDI-11-011/
https://www.zerodayinitiative.com/advisories/ZDI-11-012/
Severity: Critical
ID: 51645
File Name: openview_nnm_execvp_nc.nasl
Version: 1.14
Type: remote
Family: CGI abuses
Published: 1/21/2011
Updated: 1/19/2021
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 1/10/2011
Vulnerability Publication Date: 7/20/2010
Core Impact
Metasploit (HP OpenView NNM nnmRptConfig.exe schdParams Buffer Overflow)
CVE: CVE-2010-2703, CVE-2011-0261, CVE-2011-0262, CVE-2011-0263, CVE-2011-0264, CVE-2011-0265, CVE-2011-0266, CVE-2011-0267, CVE-2011-0268, CVE-2011-0269, CVE-2011-0270, CVE-2011-0271