Remote command execution on 'becommunity' (modules that support by BBS e-market professional) makes insecure calls to the include() function of PHP (works on 'pageurl=' functions) which can allow the inclusion of remote files, and thereby the execution of arbitrary commands by remote user with the web server user permissions, usually 'nobody'.
This script tests for a remote file inclusion vulnerability in SocialMPN. It takes two command line arguments: the target website and the exploit file. It sends a request to the target website with the specified exploit file included in the URL. If the response contains 'HTTP/1.0 200 OK', it indicates that the site may be vulnerable.
Apache James is prone to a remote denial-of-service vulnerability. This issue is due to the application's failure to efficiently handle malformed SMTP commands. This issue allows remote attackers to consume excessive CPU resources of affected computers, potentially denying service to legitimate users.
Edimax IC-3030iWn is prone to an information-disclosure vulnerability. Successful exploits will allow a remote attacker to gain access to sensitive information. Information obtained will aid in further attacks. The exploit is written in Python and can be used to automate the browser launch and gain access to the web admin page.