This module exploits a hidden account in the com.trinagy.security.XMLUserManager Java class. When using this account, an attacker can abuse the com.trinagy.servlet.HelpManagerServlet class and write arbitary files to the system allowing the execution of arbitary code.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a remote buffer overflow in coda.exe process of HP OpenView Performance Agent which listens on a random TCP port by default. The process trusts a value within a GET request as a size then proceeds to copy that many bytes of user-supplied data into a fixed-length buffer on the stack.
This module exploits a buffer overflow vulnerability in the ovalarmsrv module of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted packet to port 2954/TCP of the vulnerable system and installs an agent if successful. This module works disabling DEP on Windows 2003 Enterprise Edition sp2 in the context of the vulnerable application.
This module exploits a vulnerability in HP OpenView NNM by sending a specially crafted request to snmp.exe.
This module exploits a stack-based buffer overflow in the snmpviewer.exe CGI application, a component of HP OpenView Network Node Manager, by sending an HTTP request with an invalid value for the act and app parameters. The agent installed by this exploit will run as "IUSR" user. Authentication is not required for this exploit to work.
This module exploits a vulnerability in HP OpenView NNM by sending a specially crafted request to OvWebHelp.exe.
This module exploits a stack-based buffer overflow in the webappmon.exe CGI application, a component of HP OpenView Network Node Manager, by sending an HTTP request with an invalid value for the OvJavaLocale parameter. The agent installed by this exploit will run as "IUSR" user. Authentication is not required for this exploit to work.
This module exploits a buffer overflow vulnerability in the ovas service, part of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted POST request with a malformed Destination Node variable to the vulnerable system and installs an agent if successful.
This module exploits a buffer overflow vulnerability in the ovalarm.exe application, part of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted HTTP request to the ports 3443/TCP or 80/TCP of the vulnerable system and installs an agent if successful. On Windows, the agent installed by this exploit will run as "IUSR" user.
Pagination
- Previous page
- Page 85
- Next page