This module exploits a remote buffer overflow in the RPC protocol parsing library (librpc.dll) included on IBM Informix Dynamic Server by sending a specially crafted authentication packet to the 36890/TCP port.
IBM Director is prone to a remote code execution vulnerability that affects the CIM server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the CIM server process.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing IBM Cognos. A remote user can send specially crafted data to TCP port 5498 to trigger a stack overflow and execute arbitrary code on the target system.
This module exploits a remote code execution vulnerability in IBM Cognos Express by using an undocumented user account to upload an arbitrary .WAR file.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Httpdx Web Server. The vulnerability is caused due to a boundary error within Httpdx Web Server when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Authentication is not required to exploit this vulnerability.
This module exploits a format string vulnerability in HTTPDX FTP server by sending a specially crafted FTP command, corrupting the memory and executing arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software using HP System Management. A remote user can send specially crafted data to TCP port 2381 to trigger a stack overflow and execute arbitrary code on the target system.
The ginkgosnmp.inc PHP script in HP System Management Homepage is vulnerable to OS command injection. This vulnerability allows remote authenticated attackers to execute arbitrary code on the affected machine with SYSTEM privileges.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits two vulnerabilities in HP SiteScope to gain remote code execution. The first vulnerability is an authentication bypass in the getSiteScopeConfiguration operation available through the APISiteScopeImpl AXIS service to grab the administrator credentials from the server running HP SiteScope. The second vulnerability is a directory traversal in the UploadFileHandler url that allows to upload files to the server into a directory that allows for scripting.
Pagination
- Previous page
- Page 54
- Next page