This Metasploit module exploits a command injection vulnerability in Apache Tika versions 1.15 through 1.17 on Windows. A file with the image/jp2 content-type is used to bypass magic byte checking. When OCR is specified in the request, parameters can be passed to change the parameters passed at command line to allow for arbitrary JScript to execute. A JScript stub is passed to execute arbitrary code. This module was verified against version 1.15 through 1.17 on Windows 2012. While the CVE and finding show more versions vulnerable, during testing it was determined only versions greater than 1.14 were exploitable due to jp2 support being added.
1d10dcd077954ec22984a947fb2e56ca4e13c135682dadd44362021acac47063
Microsoft Windows suffers from a PowerShell unsanitized filename command execution vulnerability.
5bf128419e761a002a979be67be908ac183d09b615d51b039f45e8ee8acc4abf
Slackware Security Advisory - New mariadb packages are available for Slackware 14.1 and -current to fix security issues.
88e359d74512a7377541103a19c43b7fe710266e44ddaaee6f662eed622f16c8
Ubuntu Security Notice 4079-2 - USN-4079-1 fixed vulnerabilities in SoX. This update provides the corresponding update for Ubuntu 18.04 LTS and Ubuntu 19.04. It was discovered that SoX incorrectly handled certain MP3 files. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.
5ffe08fe87a127722df794d049e52f8a60387a6175169e17197ecd176757eafd
1CRM On-Premise Software version 8.5.7 suffers from a persistent cross site scripting vulnerability.
eff2bc5b0e9b2c3ca58c4026a0692a0f8fc667bfd42ba75e5e23388450bb2dd3
Sar2HTML version 3.2.1 suffers from a remote code execution vulnerability.
5fa15a6b77d4962ba78da4a2e5ccc45e9c58643332ff42a8a24f459ad157b766
College Notes Management System version 1.0 suffers from a cross site request forgery vulnerability.
5a473bcd1e8fd7ec281d752f4d5fd3085ac3d7648cff696292ab9a73ff6acd76
Rest Cafe and Restaurant Website CMS suffers from a remote SQL injection vulnerability.
8209eb6be8ace74a8b33c7c568913ba58b65b8e519c0954a7543d0f4d25d38b6