An arbitrary file download vulnerability exists in dl-skin.php file. A remote attacker might gain access to arbitrary files using a specially crafted HTTP request.
Category Archives: Checkpoint
Checkpoint
WebNMS Framework Server Arbitrary File Upload (CVE-2016-6600)
An Arbitrary File Upload vulnerability exists in WebNMS Framework. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.
WordPress wSecure Lite Plugin Remote Command Execution
A remote code execution vulnerability exists in WordPress wSecure Lite Plugin. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.
WordPress Ninja Forms Plugin SQL Injection
An SQL injection vulnerability exists in the WordPress Ninja Forms Plugin. It allows an authenticated remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
JexBoss Security Scanner
JexBoss is a vulnerability scanning product. Remote attackers can use JexBoss to detect vulnerabilities on a target server.
Symantec Endpoint Protection Manager Cross-Site Scripting (CVE-2016-3652; CVE-2016-3652)
A cross-site-scripting vulnerability has been reported in the Symantec Endpoint Protection Manager. The vulnerability is due to insufficient input validation on user-supplied input. A remote attacker could exploit this vulnerability by enticing authenticated users to click on a crafted link. Successful exploitation could allow the attacker to execute malicious script code in the context of the victim’s browser.
Weak Password Login Attempt Over Telnet
Telnet is an internet protocol that provides access to remote computers using a virtual terminal. A remote attacker may use an open Telnet service to run arbitrary code on the victim machine.
Rockwell Automation MicroLogix Remote Code Execution (CVE-2016-5645)
A vulnerability exists in the SNMP functionality on Rockwell Automation PLC systems. A remote attacker can leverage the vulnerability to execute arbitrary code on the affected system.
WECON LeviStudio String Content Heap Buffer Overflow
The vulnerability is due to improper parsing of XML String Content attribute of LeviStudio project files. A remote attacker could exploit this vulnerability by enticing a user to open a crafted project. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user process.
WordPress Core Authenticated Cross-Site Scripting (CVE-2016-1564)
A cross-site scripting vulnerability exists in WordPress core. Successful exploitation of this vulnerability would allow remote attackers to inject an arbitrary web script into the affected system.