This module exploits a remote file include vulnerability in Railo, tested against version 4.2.1. First, a call using a vulnerable <cffile> line in thumbnail.cfm allows an attacker to download an arbitrary PNG file. By appending a .cfm, and taking advantage of a directory traversal, an attacker can append cold fusion markup to the PNG file, and have it interpreted by the server. This is used to stage and execute a fully-fledged payload.
A remote code execution web vulnerability has been discovered in the official Briefcase Pro v4.0 iOS mobile wifi web-application. The vulnerability allows an attacker to compromise the application and connected device by usage of a system specific command execution. The vulnerability is located in the 'Create Folder (Add Folder)' input field. The input field to create folders allows to inject the input via POST method request.
The BP Blog 7.0 script is vulnerable to SQL injection. By manipulating the 'layout' parameter in the default.asp file, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database, such as the author's username and password.
This vulnerability allows attackers to execute arbitrary code by enticing a legitimate user to open a file from a network share location that contains a specially crafted DLL file.
e107 is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The OES (Open Educational System) version 0.1beta has a vulnerability in the includes/lib-account.inc.php file. The include function is improperly used, allowing an attacker to include arbitrary remote files.
The Netautor Professional web application fails to properly sanitize user-supplied data, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary HTML and script code in the browser of an unsuspecting user, potentially allowing them to steal authentication credentials and launch further attacks.
This exploit is an 0day in Ammyy Admin, a remote desktop type software. It allows the attacker to take over the controller when someone tries to connect to them. The exploit is launched from a DLL injected into a copy of AA, which hooks AA's data send functions, replacing them with the exploit data.
chillyCMS is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
Mollify is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary JavaScript code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.