PowerFolder Server is prone to a remote vulnerability that allows attackers to take advantage of a deserialization vulnerability present in the commons-collections Java library.
Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192.
OpenNMS Platform is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.
This module exploits an unauthenticated PHP Injection vulnerability abusing the unserialize() function.
phpMyAdmin is prone to a regexp abuse via an eval modifier which can be found in old PHP versions. This vulnerability allows authenticated attackers to run arbitrary php code on the affected server.
PHP versions 4.3.0-5.4.6 had a "feature" which allowed users to run a RegExp Pattern Modifier using PREG_REPLACE_EVAL and may lead to execute code.
phpMyAdmin had an issue in their code that can be exploited from a table replace call.
The general idea is to insert a crafted regexp eval record format, and then trigger it via a find and replace function with system commands
For that purpose, the exploit will try to use any existing cookies of that host, or the username and password provided.
Once logged in, if the user provided a database, it will be used. If not, we will search for existing databases.
The attack will not leave any trace.
This exploit installs an OS Agent.
PHP versions 4.3.0-5.4.6 had a "feature" which allowed users to run a RegExp Pattern Modifier using PREG_REPLACE_EVAL and may lead to execute code.
phpMyAdmin had an issue in their code that can be exploited from a table replace call.
The general idea is to insert a crafted regexp eval record format, and then trigger it via a find and replace function with system commands
For that purpose, the exploit will try to use any existing cookies of that host, or the username and password provided.
Once logged in, if the user provided a database, it will be used. If not, we will search for existing databases.
The attack will not leave any trace.
This exploit installs an OS Agent.
A vulnerability exists in the FileUploadServlet servlet of WebNMS Framework Server. This servlet allows unauthenticated file uploads. By uploading a JSP file, an attacker can achieve remote code execution.
JMS Object messages within Apache ActiveMQ depend on Java Serialization for marshaling/unmashaling of the message payload. This lead to execution of untrusted code when a specially crafted object is received.
This update introduces an exploit that will attempt to connect using the STOMP protocol and abuse the vulnerability to execute a Core Impact agent in the vulnerable system.
This update introduces an exploit that will attempt to connect using the STOMP protocol and abuse the vulnerability to execute a Core Impact agent in the vulnerable system.
This module exploits a vulnerability in the Linux kernel related to the netfilter target_offset field. This vulnerability can be exploited by a local unprivileged attacker to gain root privileges.
Action Pack in Ruby on Rails allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
JBoss Application Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary java objects leading to remote code execution.
This vulnerability affects the EJBInvokerServlet component of the server.
This vulnerability affects the EJBInvokerServlet component of the server.
Pagination
- Previous page
- Page 22
- Next page