CVE-2005-2773

HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl.
References
Link Resource
http://marc.info/?l=bugtraq&m=112499121725662&w=2 Exploit Issue Tracking Mailing List
http://secunia.com/advisories/16555/ Not Applicable
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/bid/14662 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 Third Party Advisory
http://marc.info/?l=bugtraq&m=112499121725662&w=2 Exploit Issue Tracking Mailing List
http://secunia.com/advisories/16555/ Not Applicable
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/advisories/9150 Broken Link
http://www.securityfocus.com/bid/14662 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2005-2773
Configurations

Configuration 1 (hide)

cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*

History

22 Oct 2025, 01:15

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2005-2773 -

21 Oct 2025, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2005-2773', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2005-2773 -

07 Feb 2025, 15:15

Type Values Removed Values Added
CWE CWE-77

15 Jan 2025, 23:34

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - Exploit, Issue Tracking, Mailing List
References () http://secunia.com/advisories/16555/ - Broken Link () http://secunia.com/advisories/16555/ - Not Applicable
References () http://www.securityfocus.com/advisories/9150 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/advisories/9150 - Broken Link
References () http://www.securityfocus.com/bid/14662 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/14662 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - VDB Entry, Vendor Advisory () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - Third Party Advisory

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - Mailing List
References () http://secunia.com/advisories/16555/ - Broken Link () http://secunia.com/advisories/16555/ - Broken Link
References () http://www.securityfocus.com/advisories/9150 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/advisories/9150 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/14662 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/14662 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - VDB Entry, Vendor Advisory () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - VDB Entry, Vendor Advisory

16 Jul 2024, 17:50

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:hp:openview_network_node_manager:6.4:*:solaris:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:7.50:*:solaris:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.2:*:nt_4.x_windows_2000:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.4:*:nt_4.x_windows_2000:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.41:*:solaris:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.31:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.31:*:nt_4.x_windows_2000:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.2:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows_2000_xp:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.4:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:7.50:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:7.50:*:windows_2000_xp:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.10:*:*:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:6.2:*:solaris:*:*:*:*:*
cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*
References () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - () http://marc.info/?l=bugtraq&m=112499121725662&w=2 - Mailing List
References () http://secunia.com/advisories/16555/ - () http://secunia.com/advisories/16555/ - Broken Link
References () http://www.securityfocus.com/advisories/9150 - () http://www.securityfocus.com/advisories/9150 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/14662 - () http://www.securityfocus.com/bid/14662 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 - VDB Entry, Vendor Advisory
CWE NVD-CWE-Other NVD-CWE-noinfo

Information

Published : 2005-09-02 23:03

Updated : 2025-10-22 01:15


NVD link : CVE-2005-2773

Mitre link : CVE-2005-2773

CVE.ORG link : CVE-2005-2773


JSON object : View

Products Affected

hp

  • openview_network_node_manager
CWE
NVD-CWE-noinfo CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')