SAP BusinessObjects Axis2 Default Admin Password vulnerability with remote code execution via arbitrary web service upload and Axis2 restart
Reporter | Title | Published | Views | Family All 31 |
---|---|---|---|---|
Packet Storm | Axis2 Upload Exec (via REST) | 1 Dec 201000:00 | – | packetstorm |
Packet Storm | Apache Axis2 Brute Force Utility | 1 Sep 202400:00 | – | packetstorm |
Packet Storm | Axis2 / SAP BusinessObjects dswsbobje Upload Exec | 16 Nov 201000:00 | – | packetstorm |
Packet Storm | Rapid7 Security Advisory 37 | 15 Oct 201000:00 | – | packetstorm |
Tenable Nessus | Apache Axis2 Default Credentials | 27 May 201000:00 | – | nessus |
Exploit DB | Axis2 / SAP BusinessObjects - (Authenticated) Code Execution (via SOAP) (Metasploit) | 14 Dec 201000:00 | – | exploitdb |
Exploit DB | Axis2 - (Authenticated) Code Execution (via REST) (Metasploit) | 14 Dec 201000:00 | – | exploitdb |
Exploit DB | CA ARCserve D2D r15 - Web Service Servlet Code Execution | 30 Dec 201000:00 | – | exploitdb |
Saint | HP Universal CMDB Server Axis2 default password | 22 Feb 201100:00 | – | saint |
Saint | HP Universal CMDB Server Axis2 default password | 22 Feb 201100:00 | – | saint |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo