header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AppSmith 1.47 – Remote Code Execution (RCE)

A vulnerability in AppSmith versions prior to v1.52 allows unauthenticated remote code execution due to a misconfigured PostgreSQL database that permits execution of the COPY FROM PROGRAM command. Attackers can exploit this to run arbitrary commands on the system hosting the application.

ABB Cylon Aspect 3.08.02 – Remote Code Execution

The ABB Cylon Aspect BMS/BAS controller before 3.08.02 is vulnerable to authenticated OS command injection. Attackers can upload a specially crafted .db file that contains malicious shell commands. These commands are then executed on the server through the copyFile.sh script, bypassing filename sanitization.

Adapt Authoring Tool 0.11.3 – Remote Command Execution (RCE)

The Adapt Authoring Tool version 0.11.3 is vulnerable to remote command execution. An attacker can exploit this vulnerability to execute commands remotely. This issue has been assigned CVE identifiers CVE-2024-50672 and CVE-2024-50671.

ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) – Remote Code Execution

The ABB Cylon Aspect BMS/BAS controller in version 3.08.02 and below is vulnerable to an authenticated blind command injection. Attackers can execute arbitrary shell commands by manipulating input in certain POST parameters. Additionally, an off-by-one error in array access can result in undefined behavior and potential Denial of Service (DoS) attacks.

Centron 19.04 – Remote Code Execution (RCE)

The exploit allows for remote code execution in Centreon 19.04 through a login password bruteforce attack using the centbruteon.py script. By sending specially crafted requests to the Centreon API authentication endpoint, an attacker can execute arbitrary code on the target system.

ABB Cylon Aspect 4.00.00 Remote Code Execution Vulnerability

The ABB Cylon Aspect BMS/BAS controller before 4.00.00 allows unauthenticated attackers to execute arbitrary shell commands via unsanitized input in the serial and ManufactureDate POST parameters. This vulnerability can be exploited during the manufacturing phase when factory test scripts are present.

Recent Exploits: