• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

authenticated

  1. 1

    Exploits D-Link DWL-2600AP Authenticated OS Command Injection

    D-Link DWL-2600AP suffers from an authentication OS command injection vulnerability via the tftp restore functionality. View the full article
  2. 1

    Exploits Webmin 1.900 Upload Authenticated Remote Command Execution

    This Metasploit module exploits an arbitrary command execution vulnerability in Webmin 1.900 and lower versions. Any user authorized to the "Upload and Download" module can execute arbitrary commands with root privileges. In addition, if the Running Processes (proc) privilege is set the user can...
  3. 1

    Exploits Nuuo Central Management Server 2.4 Authenticated Arbitrary File Upload

    The COMMITCONFIG verb is used by a CMS client to upload and modify the configuration of the CMS Server. The vulnerability is in the FileName parameter, which accepts directory traversal (..\\..\\) characters. Therefore, this function can be abused to overwrite any files in the installation drive...
  4. 1

    Exploits phpMyAdmin 4.8.1 Authenticated Local File Inclusion

    phpMyAdmin version 4.8.1 authenticated local file inclusion proof of concept exploits. View the full article
  5. 1

    Exploits Atlassian Jira Authenticated Upload Code Execution

    This Metasploit module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request...
  6. 1

    Exploits WebExec Authenticated User Code Execution

    This Metasploit module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" module, except allows any non-guest account by default. View the full article
Back
Top