This module exploits a remote code execution vulnerability in HP Intelligent Management Center by using the "mibFileUpload" servlet to upload an arbitrary .JSP file.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing HP iNode Management Center. A remote user can send specially crafted data to TCP port 9090 to trigger a stack overflow and execute arbitrary code on the target system.
This module exploits a remote code execution vulnerability in HP Data Protector by sending a specially crafted EXEC_BAR request.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP Data Protector application by sending a malformed packet.
This module exploits a remote stack-based buffer overflow vulnerability in HP Data Protector, by sending a malformed message with opcode 0x330 to the port 3817/TCP, which will trigger a buffer overflow. Authentication is not required to exploit this vulnerability.
This module exploits a buffer overflow vulnerability in HP Data Protector Express. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3817.
This module exploits a buffer overflow vulnerability in HP Data Protector by sending a specially crafted EXEC_CMD request.
This module exploits a remote code execution vulnerability in HP Data Protector by sending a specially crafted EXEC_BAR request.
This module exploits a remote stack-based buffer overflow vulnerability in HP Data Protector, by sending a specially crafted packet to the port 3817/TCP, which will trigger a buffer overflow when processed by the DtbClsLogin function in the dpwindtb.dll module. Authentication is not required to exploit this vulnerability.
This module exploits a design flaw in HP Data Protector by sending a specially crafted EXEC_SETUP request.
Pagination
- Previous page
- Page 58
- Next page