This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing HP iNode Management Center. A remote user can send specially crafted data to TCP port 9090 to trigger a stack overflow and execute arbitrary code on the target system.
This module exploits a remote code execution vulnerability in HP Data Protector by sending a specially crafted EXEC_BAR request.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP Data Protector application by sending a malformed packet.
This module exploits a remote stack-based buffer overflow vulnerability in HP Data Protector, by sending a malformed message with opcode 0x330 to the port 3817/TCP, which will trigger a buffer overflow. Authentication is not required to exploit this vulnerability.
This module exploits a buffer overflow vulnerability in HP Data Protector Express. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3817.
This module exploits a buffer overflow vulnerability in HP Data Protector by sending a specially crafted EXEC_CMD request.
This module exploits a remote code execution vulnerability in HP Data Protector by sending a specially crafted EXEC_BAR request.
This module exploits a remote stack-based buffer overflow vulnerability in HP Data Protector, by sending a specially crafted packet to the port 3817/TCP, which will trigger a buffer overflow when processed by the DtbClsLogin function in the dpwindtb.dll module. Authentication is not required to exploit this vulnerability.
This module exploits a design flaw in HP Data Protector by sending a specially crafted EXEC_SETUP request.
This module exploits a remote buffer overflow in the CRS.exe service included in the HP Data Protector application by sending a malformed packet.
Pagination
- Previous page
- Page 117
- Next page