The iziContents <= RC6 has multiple vulnerabilities that can lead to remote file inclusion, local file inclusion, and remote file disclosure. The RFI vulnerabilities can be exploited through various modules such as search.php, inlinepoll.php, showpoll.php, showlinks.php, and submit_links.php. The LFI vulnerabilities can be exploited through poll_summary.php and db.php. The remote file disclosure vulnerability can be exploited through tiny_mce_gzip.php.
This module exploits a vulnerability in browsers using well-known property of WebRTC (Web Real-Time Communications) which enables Web applications and sites to capture or exchange arbitrary data between browsers without requiring an intermediary.
This exploit allows an attacker to include remote files in the Joomla Component Flash Slide Show Image Gallery. The vulnerability is considered high risk.
This module will generate and upload a plugin to ProcessMaker resulting in execution of PHP code as the web server user. Credentials for a valid user account with Administrator roles is required to run this module. This module has been tested successfully on ProcessMaker versions 1.6-4276, 2.0.23, 3.0 RC 1, 3.2.0, 3.2.1 on Windows 7 SP 1; and version 3.2.0 on Debian Linux 8.
The affected device suffers from authenticated remote code execution vulnerability. Including a CSRF, a remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges.
This is a remote exploit for IMAIL Smtp Server(1.2) version 8.01-8.11. The exploit is used to attack the hostname specified using the options provided. It supports win2k All version and IMail 8.01-11. The exploit uses the strcpy function to copy a buffer from src to dst, which can lead to a buffer overflow vulnerability. The exploit also connects back to an IP and port specified using the options. The bad characters used in the exploit are 0x00, 0x0a, and 0x25. The exploit also manipulates the PEB structure to hide its presence.
Vtiger 6.3.0 CRM's administration interface allows for the upload of a company logo. Instead of uploading an image, an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This module was tested against vTiger CRM v6.3.0.
This exploit allows remote code execution on Advantech WebAccess version 8.0-2015.08.16. It takes advantage of a stack-based buffer overflow vulnerability in the DrawSrv.dll file. By sending a specially crafted request to the target system, an attacker can execute arbitrary code.
The exploit creates a file with a payload of 3500 bytes, causing a denial of service on the vulnerable software SysGauge v4.5.18. The payload is created by writing 'A' 3500 times to a file named payload.txt.
No protection on the wp-content/uploads/wp-security-audit-log/* which is indexed by google and allows for attackers to possibly find user information (bad login attempts)