This module exploits a remote code execution vulnerability in HP Rational Quality Manager by using an default user account to upload an arbitrary file.
The AgentServlet class in the Web interface of HP ProCurve Agent is prone to an authentication bypass vulnerability when handling HEAD requests. This vulnerability can be abused by remote unauthenticated attackers to modify the configuration of the HP ProCurve Agent, which can ultimately be leveraged to access the Tornado service component and finally execute arbitrary code with SYSTEM privileges on the target machine.
This module exploits a remote buffer overflow in the HP Power Manager Administration Web Server by sending a specially crafted POST request.
This module exploits an insufficient input validation and authentication to upload and execute an arbitrary .JSP file in HP Performance Insight.
This module exploits a remote code execution vulnerability in HP Operations Manager by using an undocumented user account to upload an arbitrary file.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits a hidden account in the com.trinagy.security.XMLUserManager Java class. When using this account, an attacker can abuse the com.trinagy.servlet.HelpManagerServlet class and write arbitary files to the system allowing the execution of arbitary code.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a buffer overflow vulnerability in the ovalarmsrv module of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted packet to port 2954/TCP of the vulnerable system and installs an agent if successful. This module works disabling DEP on Windows 2003 Enterprise Edition sp2 in the context of the vulnerable application.
Pagination
- Previous page
- Page 118
- Next page