The MobileIron Virtual Smartphone Platform has a command injection vulnerability within the telnet/SSH shell that allows for elevation of privileges to "root" from a low privileged user as well as escaping the restrictive shell.
PluggedOut CMS is prone to multiple cross-site scripting and SQL injection vulnerabilities. Exploitation could allow for theft of cookie-based authentication credentials or unauthorized access to database data. Other attacks are also possible.
The Contrexx CMS is affected by multiple input validation vulnerabilities that allow for HTML injection, SQL injection, and information disclosure attacks. An attacker can exploit these vulnerabilities by supplying a specially crafted value for the 'votingoption' parameter and submitting the form. Additionally, the vulnerabilities can be exploited through the 'section' and 'term' parameters in specific URLs. These vulnerabilities can be used to carry out attacks such as executing arbitrary JavaScript code (XSS) and retrieving sensitive information from the database.
This is a local exploit for splitvt version less than 1.6.5. It allows an attacker to gain unauthorized access to the system.
This script can be used to check whether a user exists on a remote server running OpenSSH. It relies on the timing difference between valid and invalid user login attempts to determine if a user exists or not. It is accurate against Red Hat boxes and Linux boxes running grsecurity, but not vulnerable on *BSD boxes which always have a 10-second delay.
The mod_oradav module for Oracle HTTP Server included in Oracle9i Application Server is prone to a vulnerability. This is related to access controls on the '/dav_public' and '/dav_portal' directories, allowing a malicious user to fill up the directory. It is not known if this could have other security impacts.
This exploit allows remote code execution in PH Pexplorer version 0.24. By uploading an evil file and setting the 'Language' cookie to the path of the evil file, an attacker can run the evil file on all script pages.
This modules exploits a vulnerability found in the Oracle WebCenter Content CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where user controlled input is used to call ShellExecuteExW(). This module abuses the control to execute an arbitrary HTA from a remote location. This module has been tested successfully with the CheckOutAndOpenControl ActiveX installed with Oracle WebCenter Content 11.1.1.6.0.
SlimServe HTTP server is vulnerable to directory traversal attacks, which allow malicious users to read files outside of the web server root directory. An attacker can exploit this vulnerability by sending a crafted HTTP request containing '../' sequences to access sensitive files on the server.
A remote denial of service vulnerability affects Raven Software Soldier Of Fortune 2. The problem presents itself specifically when the affected server application receives an excessively large value through a '/ignore' command from a malicious client. An attacker may leverage this issue to cause an affected server to crash, denying service to legitimate users.