e6af8de8b1d4b2b6d5ba2610cbf9cd38

8 exploits Active since Dec 2012
CVE-2012-3282 EXPLOITDB ruby WORKING POC
HP LeftHand Virtual SAN Appliance <10.0 - RCE
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468.
CVE-2012-3274 METASPLOIT ruby WORKING POC
HP IMC <5.1 - Buffer Overflow
Stack-based buffer overflow in uam.exe in the User Access Manager (UAM) component in HP Intelligent Management Center (IMC) before 5.1 E0101P01 allows remote attackers to execute arbitrary code via vectors related to log data.
CVE-2013-2333 METASPLOIT ruby WORKING POC
HP Storage Data Protector <7.01 - RCE
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1680.
CVE-2013-2343 METASPLOIT ruby WORKING POC
HP LeftHand Virtual SAN Appliance <10.0 - RCE
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1510.
CVE-2013-2343 EXPLOITDB ruby WORKING POC
HP LeftHand Virtual SAN Appliance <10.0 - RCE
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1510.
EIP-2026-118646 EXPLOITDB ruby WORKING POC
HP Intelligent Management Center UAM - Remote Buffer Overflow (Metasploit)
CVE-2013-2333 EXPLOITDB ruby WORKING POC
HP Storage Data Protector <7.01 - RCE
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1680.
CVE-2012-3274 EXPLOITDB ruby WORKING POC
HP IMC <5.1 - Buffer Overflow
Stack-based buffer overflow in uam.exe in the User Access Manager (UAM) component in HP Intelligent Management Center (IMC) before 5.1 E0101P01 allows remote attackers to execute arbitrary code via vectors related to log data.