Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-4812

EPSS 74.00% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-4812

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
HP PCM/PCM+/IDM ‘UpdateCertificatesServlet’远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HP ProCurve Manager Plus(又名PCM+)是美国惠普(HP)公司的一套基于Windows的网络管理平台。HP Identity Driven Manager(IDM)是其中的一个可对网络安全和性能进行配置的插件。 HP PCM,HP PCM+,HP IDM中的SNAC注册服务器中的UpdateCertificatesServlet应用程序中存在远程代码执行漏洞,该漏洞源于程序没有正确过滤‘fileName’参数。远程攻击者可利用该漏洞上传.jsp格式的文件,可执行任意代码。以下版本受
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-4812

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-4812

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-09-13 · 29 CVEs total

CVE-2013-4811HP PCM/PCM+/IDM ‘UpdateDomainControllerServlet’远程代码执行漏洞
CVE-2013-5649Juniper Junos Pulse Secure Access Service 跨站脚本漏洞
CVE-2013-5493Cisco Virtualization Experience Client 6000设备诊断模块任意命令执行漏洞
CVE-2013-5492Cisco SocialMiner administration.jsp页面HTTP信息泄露漏洞
CVE-2013-5489Cisco SocialMiner 小工具权限许可和访问控制漏洞
CVE-2013-5482Cisco Prime LAN Management Solution 跨框架脚本漏洞
CVE-2013-4705Opera 跨站脚本漏洞
CVE-2013-5722Wireshark LDAP解析器资源管理错误漏洞
CVE-2013-5721Wireshark ‘dissect_mq_rr’函数输入验证漏洞
CVE-2013-5720Wireshark RTPS解析器缓冲区溢出漏洞
CVE-2013-5719Wireshark ASSA R3解析器资源管理错误漏洞
CVE-2013-5718Wireshark ‘dissect_nbap_T_dCH_ID’函数拒绝服务漏洞
CVE-2013-5717Wireshark wmem_block_alloc’函数输入验证漏洞
CVE-2013-4813HP PCM/PCM+/IDM Agent 远程代码执行漏洞
CVE-2013-2888Linux Kernel HID子系统输入验证漏洞
CVE-2013-4810HP PCM/PCM+/IDM/Application Lifecycle Management 远程代码执行漏洞
CVE-2013-4809HP PCM/PCM+/IDM GetEventsServlet SQL注入漏洞
CVE-2013-2899Linux Kernel HID子系统缓冲区溢出漏洞
CVE-2013-2898Linux Kernel 越界读取信息泄露漏洞
CVE-2013-2897Linux Kernel 堆缓冲区溢出漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-4812

No comments yet


Leave a comment