This module exploits a remote code execution vulnerability in HP SiteScope. The vulnerability exists in the APISiteScopeImpl web service, specifically in the issueSiebelCmd method, which allows the user to execute arbitrary commands without authentication.
This module exploits a remote code execution vulnerability in HP Rational Quality Manager by using an default user account to upload an arbitrary file.
The AgentServlet class in the Web interface of HP ProCurve Agent is prone to an authentication bypass vulnerability when handling HEAD requests. This vulnerability can be abused by remote unauthenticated attackers to modify the configuration of the HP ProCurve Agent, which can ultimately be leveraged to access the Tornado service component and finally execute arbitrary code with SYSTEM privileges on the target machine.
This module exploits a remote buffer overflow in the HP Power Manager Administration Web Server by sending a specially crafted POST request.
This module exploits an insufficient input validation and authentication to upload and execute an arbitrary .JSP file in HP Performance Insight.
This module exploits a remote code execution vulnerability in HP Operations Manager by using an undocumented user account to upload an arbitrary file.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits a hidden account in the com.trinagy.security.XMLUserManager Java class. When using this account, an attacker can abuse the com.trinagy.servlet.HelpManagerServlet class and write arbitary files to the system allowing the execution of arbitary code.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
Pagination
- Previous page
- Page 55
- Next page