There is an include on almost all the php files, which includes the language template. The vulnerability allows an attacker to execute arbitrary commands on the server by manipulating the language parameter. By exploiting this vulnerability, an attacker can compromise the entire clients of the ISPConfig.
This exploit allows an attacker to bypass the safe_mode and disable_function restrictions in PHP 5.x COM functions, potentially leading to remote code execution and compromise of the server. The vulnerability can be exploited both locally and remotely, with remote execution requiring a server that is MS-based and configured to work with PHP. The exploit takes advantage of the fact that the script is executed from a client that does not check Windows protections against execution of dangerous COM objects. The exploit works on Windows servers running Apache and PHP, and has been tested on Windows XP Pro SP2.
The virtualenv version 16.0.0 allows an attacker to escape the sandbox and execute arbitrary commands with root privileges. By using the '$(bash >&2)' or '$(rbash >&2)' command injection technique, an attacker can execute arbitrary commands in the context of the virtual environment.
On the RICOH MP C1803 JPN printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.
A cross site scripting vulnerability has been discovered in the AIR5342 modem of the AirTies manufacturer. AirTies Air 5342 devices have XSS via the top.html productboardtype parameter.
This exploit allows an attacker to disclose files remotely on an Apache Tomcat server. It supports SSL connections and requires valid login credentials and webdav access. The exploit is written in Perl.
Multiple remote file inclusion vulnerabilities exist in PeopleAggregator 1.2pre6. These vulnerabilities allow an attacker to include arbitrary files from remote servers, potentially leading to remote code execution or information disclosure.
In the 5.4.0 version of the Fork CMS software, HTML Injection and Stored XSS vulnerabilities were discovered via the /backend/ajax URI.
This takes advantage of the CREATE ALIAS RCE (https://www.exploit-db.com/exploits/44422/). When the test database has a password that is unknown, it is still possible to get the execution by creating a new database. The web console allows this by entering the name of the new database in the connection string. When the new database is created, the default credentials of username “sa” and password “” (blank) are created. The attacker is logged in automatically. The attached Python code, modified from 44422, demonstrates this.
Vulnerability occurs when the Zahir cannot handle large inputs and anomalies crafted CSV file. The Zahir main program failed to process the CR LF (Carriage Return Line Feed) characters which caused the Zahir main program to crash.