Axil CMS version 0.1 suffers from a remote SQL injection vulnerability that allows for login bypass.
a72259e5a0cc0fc7e03db97358db172b5f910222cde66c42f2396e56eb331e76
Axil CMS version 3.0 suffers from a cross site scripting vulnerability.
28dfa34c5386042c24410347c2d8aaacb98e1900a84886175e524c05fd4214b7
This Metasploit module exploits the unsecured User Manager REST API and a ZIP file path traversal in Apache Jetspeed-2, versions 2.3.0 and unknown earlier versions, to upload and execute a shell. Note: this exploit will create, use, and then delete a new admin user. Warning: in testing, exploiting the file upload clobbered the web interface beyond repair. No workaround has been found yet. Use this module at your own risk. No check will be implemented.
f98ee50658aec27fea6e1325e83c5d9c0afefcbe8bf5d2b5dab9fa93e03887b6