source: https://www.securityfocus.com/bid/61081/info Air Drive Plus is prone to multiple input validation vulnerabilities including a local file-include vulnerability, an arbitrary file-upload vulnerability, and an HTML-injection vulnerability. An attacker can exploit these issues to upload arbitrary files onto the web server, execute arbitrary local files within the context of the web server, obtain sensitive information, execute arbitrary script code within the context of the browser, and steal cookie-based authentication credentials. Air Drive Plus 2.4 is vulnerable; other versions may also be affected. ;/private/var/mobile/Applications/ 27,27KB2013-07-08 23:07:52 Delete 1337.png.gif.php.js.html 27,27KB2013-07-08 23:07:52Delete [PERSISTENT INJECTED SCRIPT CODE!]1337.png27,27KB 2013-07-08 23:07:52Delete