This exploit allows remote command execution in VigileCMS version 1.8 and below. The vulnerability is demonstrated through a code snippet in the index.php file and func.inc.php file. It allows unauthorized users to execute commands on the server.
This exploit targets a vulnerability in MacOS that allows an attacker to execute arbitrary code with elevated privileges. The vulnerability is caused by a memory corruption issue in the CFString and CFSet APIs. By spraying specially crafted CFString and CFSet objects in the system memory, the exploit is able to overwrite critical data structures and gain control over the system. The exploit leverages a combination of heap spraying, stack pivoting, and return-oriented programming (ROP) techniques to achieve code execution. This vulnerability has a high severity with a CVSS score of 9.8.
The vulnerability allows an attacker to execute arbitrary code by leveraging the processOtherServices and processRunners methods in the GrapeIvy class of the Groovy library used by Jenkins. By creating a malicious JAR file and placing the class name in the META-INF/services/org.codehaus.groovy.plugins.Runners file, an attacker can invoke the Constructor and execute arbitrary code.
The vulnerability allows an attacker to include a remote file which can lead to remote code execution or other malicious activities. The vulnerable code is located in the file 'admin/kfm/initialise.php' where it includes various files without proper input validation.
In file common/FileAttachment.jsp line 332 only check file upload extension when parameter 'module' equal to 'SSP' or 'DashBoard' or 'HomePage', and if parameter 'module' is set to 'CustomLogin' will skip check file upload extension function and upload arbitrary file to folder '/custom/login' and this file can access directly from url 'host:port/custom/login/filename' . An authenticated user with minimum permission (ex: guest) can upload webshell to server.
Input passed to the "seid" parameter in events modules is not properly verified before being used to sql query.
This exploit allows an attacker to inject malicious scripts into the Comodo Dome Firewall software, specifically in the 'username', 'comment', and 'admin_name' parameters. The payload used in the exploit triggers an alert pop-up with the specified message.
ArangoDB Community Edition 3.4.2-1 is vulnerable to Cross-Site Scripting (XSS) attacks. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users. There are three different XSS vulnerabilities in ArangoDB 3.4.2-1: DOM Based XSS - Search, Reflected & Stored - Save as, and Stored - Delete query.
The Apache CouchDB server 2.3.0 is vulnerable to Cross-Site Scripting (XSS) attacks. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users, leading to unauthorized actions or data theft.
This exploit allows an attacker to perform SQL injection in the 'post' parameter of the CMSsite 1.0 application. By manipulating the 'post' parameter, an attacker can execute arbitrary SQL queries, potentially gaining unauthorized access to the database or performing other malicious actions.