This module exploits an insufficient input validation and authentication to upload and execute an arbitrary .JSP file in HP Performance Insight.
This module exploits a remote code execution vulnerability in HP Operations Manager by using an undocumented user account to upload an arbitrary file.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits a hidden account in the com.trinagy.security.XMLUserManager Java class. When using this account, an attacker can abuse the com.trinagy.servlet.HelpManagerServlet class and write arbitary files to the system allowing the execution of arbitary code.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a buffer overflow vulnerability in the ovalarmsrv module of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted packet to port 2954/TCP of the vulnerable system and installs an agent if successful. This module works disabling DEP on Windows 2003 Enterprise Edition sp2 in the context of the vulnerable application.
This module exploits a vulnerability in HP OpenView NNM by sending a specially crafted request to snmp.exe.
This module exploits a stack-based buffer overflow in the snmpviewer.exe CGI application, a component of HP OpenView Network Node Manager, by sending an HTTP request with an invalid value for the act and app parameters. The agent installed by this exploit will run as "IUSR" user. Authentication is not required for this exploit to work.
This module exploits a vulnerability in HP OpenView NNM by sending a specially crafted request to OvWebHelp.exe.
Pagination
- Previous page
- Page 114
- Next page