header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Code Execution Vulnerability in ARMBot

This exploit allows an attacker to execute arbitrary code on the vulnerable server by exploiting a vulnerability in the ARMBot application. The vulnerability exists due to insufficient input validation in the upload.php script, which allows an attacker to upload a malicious file containing arbitrary code to the server. The attacker can then access the malicious file via a specially crafted URL.

Heap Overflow in [NSURL initWithCoder:]

When an NSURL is deserialized, one property its plist can contain is NS.minimalBookmarkData, which is then used as a parameter for [NSURL URLByResolvingBookmarkData:options:relativeToURL:bookmarkDataIsStale:error:]. This method uses a wide variety of code to parse the provided bookmark data. On a Mac, if the data is a pre-2012 alias file, it will be processed using the FSResolveAliasWithMountFlags function in the CarbonCore framework. This function can eventually call ALI_GetUTF8Path, which has an unsafe call to strcat_chk, leading to memory corruption.

Rest – Cafe and Restaurant Website CMS – SQL Injection

An attacker can exploit a SQL injection vulnerability in the Rest - Cafe and Restaurant Website CMS by sending a specially crafted GET request to the news.php page with the vulnerable parameter 'slug'. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

WebIncorp ERP – SQL injection

A SQL injection vulnerability exists in WebIncorp ERP, which allows an attacker to execute arbitrary SQL commands via the vulnerable parameter 'prod_id' in the 'product_detail.php' page. An attacker can send a specially crafted GET request to the vulnerable page to exploit this vulnerability.

Extenua SilverSHielD 6.x local priviledge escalation

Extenua SilverShield 6.x fails to secure its ProgramData subfolder. This module exploits this by injecting a new user into the database and then using that user to login the SSH service and obtain SYSTEM. This results in to FULL SYSTEM COMPROMISE. At time of discolsure, no fix has been issued by vendor.

Recent Exploits: