語系:
https://www.zerodayinitiative.com/advisories/ZDI-11-003/
https://www.zerodayinitiative.com/advisories/ZDI-11-004/
https://www.zerodayinitiative.com/advisories/ZDI-11-005/
https://www.zerodayinitiative.com/advisories/ZDI-11-006/
https://www.zerodayinitiative.com/advisories/ZDI-11-007/
https://www.zerodayinitiative.com/advisories/ZDI-11-008/
https://www.zerodayinitiative.com/advisories/ZDI-11-009/
https://www.zerodayinitiative.com/advisories/ZDI-11-010/
https://www.zerodayinitiative.com/advisories/ZDI-11-011/
https://www.zerodayinitiative.com/advisories/ZDI-11-012/
嚴重性: Critical
ID: 51645
檔案名稱: openview_nnm_execvp_nc.nasl
版本: 1.14
類型: remote
系列: CGI abuses
已發布: 2011/1/21
已更新: 2021/1/19
支援的感應器: Nessus
風險因素: High
分數: 7.4
風險因素: Critical
基本分數: 10
時間分數: 8.3
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
排除在外的 KB 項目: Settings/disable_cgi_scanning
可輕鬆利用: No exploit is required
修補程式發佈日期: 2011/1/10
弱點發布日期: 2010/7/20
Core Impact
Metasploit (HP OpenView NNM nnmRptConfig.exe schdParams Buffer Overflow)
CVE: CVE-2010-2703, CVE-2011-0261, CVE-2011-0262, CVE-2011-0263, CVE-2011-0264, CVE-2011-0265, CVE-2011-0266, CVE-2011-0267, CVE-2011-0268, CVE-2011-0269, CVE-2011-0270, CVE-2011-0271