header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

§ 0day VigileCMS <= 1.8 Stealth - Remote Command Execution §

This exploit allows remote command execution in VigileCMS version 1.8 and below. The vulnerability is demonstrated through a code snippet in the index.php file and func.inc.php file. It allows unauthorized users to execute commands on the server.

Exploit for MacOS vulnerability

This exploit targets a vulnerability in MacOS that allows an attacker to execute arbitrary code with elevated privileges. The vulnerability is caused by a memory corruption issue in the CFString and CFSet APIs. By spraying specially crafted CFString and CFSet objects in the system memory, the exploit is able to overwrite critical data structures and gain control over the system. The exploit leverages a combination of heap spraying, stack pivoting, and return-oriented programming (ROP) techniques to achieve code execution. This vulnerability has a high severity with a CVSS score of 9.8.

Arbitrary Code Execution via Grape in Jenkins

The vulnerability allows an attacker to execute arbitrary code by leveraging the processOtherServices and processRunners methods in the GrapeIvy class of the Groovy library used by Jenkins. By creating a malicious JAR file and placing the class name in the META-INF/services/org.codehaus.groovy.plugins.Runners file, an attacker can invoke the Constructor and execute arbitrary code.

DevMass Shopping Cart <= 1.0 Remote File Include Vulnerability

The vulnerability allows an attacker to include a remote file which can lead to remote code execution or other malicious activities. The vulnerable code is located in the file 'admin/kfm/initialise.php' where it includes various files without proper input validation.

Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 – arbitrary file upload

In file common/FileAttachment.jsp line 332 only check file upload extension when parameter 'module' equal to 'SSP' or 'DashBoard' or 'HomePage', and if parameter 'module' is set to 'CustomLogin' will skip check file upload extension function and upload arbitrary file to folder '/custom/login' and this file can access directly from url 'host:port/custom/login/filename' . An authenticated user with minimum permission (ex: guest) can upload webshell to server.

ArangoDB Community Edition 3.4.2-1 | Cross-Site Scripting

ArangoDB Community Edition 3.4.2-1 is vulnerable to Cross-Site Scripting (XSS) attacks. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users. There are three different XSS vulnerabilities in ArangoDB 3.4.2-1: DOM Based XSS - Search, Reflected & Stored - Save as, and Stored - Delete query.

CMSsite 1.0 – ‘post’ SQL Injection

This exploit allows an attacker to perform SQL injection in the 'post' parameter of the CMSsite 1.0 application. By manipulating the 'post' parameter, an attacker can execute arbitrary SQL queries, potentially gaining unauthorized access to the database or performing other malicious actions.

Recent Exploits: