Nicolas Grégoire

4 exploits Active since Aug 2012
CVE-2012-2986 EXPLOITDB python WORKING POC
HP SAN/iQ 9.5 - Command Injection
lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361.
CVE-2012-4361 EXPLOITDB python WORKING POC
HP San/iq < 9.0 - OS Command Injection
lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter.
EIP-2026-103523 EXPLOITDB text WORKING POC
Java - Trigerring Java Code from a .SVG Image
CVE-2012-4362 EXPLOITDB python WORKING POC
HP San/iq - Credentials Management
hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.