This exploit allows an authenticated user to execute remote code on a Filerun version 2021.03.26.
This exploit utilizes an integer overflow vulnerability in Adobe Flash Player. By creating a large array of ByteArray objects, the exploit is able to corrupt memory and create 'holes' on the heap. This can lead to arbitrary code execution.
The ECOA Building Automation System is vulnerable to a local file disclosure vulnerability. This allows an attacker to access sensitive files on the system.
The ECOA Building Automation System suffers from a vulnerability where sensitive information is not encrypted. This vulnerability allows an attacker to potentially intercept and access sensitive data transmitted over the network.
The ECOA Building Automation System has hard-coded credentials for SSH access. This allows unauthorized users to gain access to the system and potentially control and monitor the facilities. The affected products include ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator.
The ECOA Building Automation System is vulnerable to cookie poisoning, which allows an attacker to bypass authentication.
The ECOA Building Automation System is vulnerable to directory traversal, allowing an attacker to disclose sensitive content from the system. This vulnerability affects various ECOA products including ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator. The Risk-Terminator Web Graphic control BEMS and RiskBuster Router Server are both affected. By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive information and potentially compromise the system's security.
The ECOA Building Automation System is vulnerable to a path traversal attack, which allows an attacker to upload arbitrary files to the system.
The ECOA Building Automation System is vulnerable to weak default credentials, which can be exploited by an attacker to gain unauthorized access to the system. The affected products include ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator.
This exploit allows an authenticated attacker to execute arbitrary code on a target system running FlatCore CMS version 2.0.7. The vulnerability exists in the 'files.upload-script.php' script, which allows an attacker to upload a malicious PHP file and execute arbitrary commands through the 'sg' parameter in the URL.