This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Httpdx Web Server. The vulnerability is caused due to a boundary error within Httpdx Web Server when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Authentication is not required to exploit this vulnerability.
This module exploits a format string vulnerability in HTTPDX FTP server by sending a specially crafted FTP command, corrupting the memory and executing arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software using HP System Management. A remote user can send specially crafted data to TCP port 2381 to trigger a stack overflow and execute arbitrary code on the target system.
The ginkgosnmp.inc PHP script in HP System Management Homepage is vulnerable to OS command injection. This vulnerability allows remote authenticated attackers to execute arbitrary code on the affected machine with SYSTEM privileges.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits two vulnerabilities in HP SiteScope to gain remote code execution. The first vulnerability is an authentication bypass in the getSiteScopeConfiguration operation available through the APISiteScopeImpl AXIS service to grab the administrator credentials from the server running HP SiteScope. The second vulnerability is a directory traversal in the UploadFileHandler url that allows to upload files to the server into a directory that allows for scripting.
This module exploits a remote code execution vulnerability in HP SiteScope. The vulnerability exists in the APISiteScopeImpl web service, specifically in the issueSiebelCmd method, which allows the user to execute arbitrary commands without authentication.
This module exploits a remote code execution vulnerability in HP Rational Quality Manager by using an default user account to upload an arbitrary file.
The AgentServlet class in the Web interface of HP ProCurve Agent is prone to an authentication bypass vulnerability when handling HEAD requests. This vulnerability can be abused by remote unauthenticated attackers to modify the configuration of the HP ProCurve Agent, which can ultimately be leveraged to access the Tornado service component and finally execute arbitrary code with SYSTEM privileges on the target machine.
This module exploits a remote buffer overflow in the HP Power Manager Administration Web Server by sending a specially crafted POST request.
Pagination
- Previous page
- Page 113
- Next page