A buffer overflow vulnerability in NetTransport.exe in NetTransport Download Manager 2.96L and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long HTTP response. To exploit this vulnerability, an attacker needs to issue a malicious-crafted payload in the HTTP Response Header. A successful attack could result in code execution.
This vulnerability allows attackers to bypass authorization and access resources and functionalities in the system by providing direct access to objects based on user-supplied input.
The phpBG 0.9.1 application is vulnerable to remote file inclusion. The vulnerability allows an attacker to include arbitrary files from the server using the 'rootdir' parameter in various PHP scripts. This can lead to remote code execution and compromise the server.
This script exploits a vulnerability in cdrdao to gain root privileges. It creates a malicious library and a suid shell, and then exploits cdrdao to overwrite the /etc/ld.so.preload file. By doing so, it gains root access and executes the suid shell.
An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information.
Code execution
This exploit targets the web interface of servers with Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), or Intel Small Business Technology (SBT) installed. It checks if the server is vulnerable by making a request to the index.htm page and checking the server header. If the server is vulnerable, it returns True.
The StringBleed exploit is a vulnerability in the SNMPv1 protocol that allows an attacker to read arbitrary memory from a target system. The exploit generates a SNMP request with a specific community string and OID, which triggers the vulnerability and allows the attacker to read sensitive information from the target system's memory.
The Scapy library in Python is vulnerable to remote code execution due to a buffer overflow vulnerability. By sending a specially crafted payload to a target that is running a vulnerable version of Scapy, an attacker can execute arbitrary code on the target system.
A blind SQL injection vulnerability exists in ABC estore 3.0. By injecting SQL code in the (cat_id) parameter of the index.php script, an attacker can manipulate the database and retrieve sensitive information such as usernames and passwords. This vulnerability requires the presence of subcategories for successful exploitation.