Language:
http://www.nessus.org/u?935b94fc
https://www.securityfocus.com/archive/1/525928/30/0/threaded
https://seclists.org/fulldisclosure/2013/Mar/44
http://web.archive.org/web/20120920065410/http://security.inshell.net/advisory/32
https://www.zerodayinitiative.com/advisories/ZDI-13-050/
https://www.zerodayinitiative.com/advisories/ZDI-13-051/
https://www.zerodayinitiative.com/advisories/ZDI-13-052/
https://www.zerodayinitiative.com/advisories/ZDI-13-053/
https://www.zerodayinitiative.com/advisories/ZDI-13-054/
https://www.zerodayinitiative.com/advisories/ZDI-13-057/
https://www.zerodayinitiative.com/advisories/ZDI-13-060/
https://www.zerodayinitiative.com/advisories/ZDI-13-061/
Severity: Critical
ID: 65255
File Name: hp_imc_52_e401.nasl
Version: 1.17
Type: remote
Family: Gain a shell remotely
Published: 3/13/2013
Updated: 4/11/2022
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/a:hp:intelligent_management_center
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/4/2013
Vulnerability Publication Date: 3/4/2013
Core Impact
Metasploit (HP Intelligent Management Center Arbitrary File Upload)
CVE: CVE-2012-5200, CVE-2012-5201, CVE-2012-5202, CVE-2012-5203, CVE-2012-5204, CVE-2012-5205, CVE-2012-5206, CVE-2012-5207, CVE-2012-5208, CVE-2012-5209, CVE-2012-5212, CVE-2012-5213
BID: 58293, 58672, 58673, 58675, 58676, 58677, 58965, 58966, 58968, 58969, 58970, 58972, 58973