• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

execution

  1. 1

    Exploits ATutor 2.2.4 Backup Remote Command Execution

    ATutor version 2.2.4 suffers from a backup functionality remote command execution vulnerability. View the full article
  2. 1

    Exploits Microsoft Windows PowerShell Command Execution

    Microsoft Windows suffers from a PowerShell unsanitized filename command execution vulnerability. View the full article
  3. 1

    Exploits Sar2HTML 3.2.1 Remote Command Execution

    Sar2HTML version 3.2.1 suffers from a remote code execution vulnerability. View the full article
  4. 1

    Exploits Redis Unauthenticated Code Execution

    This Metasploit module can be used to leverage the extension functionality added by Redis 4.x and 5.x to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis which called replication between master and slave. View the full article
  5. 1

    Exploits WordPress Database Backup Remote Command Execution

    There exists a command injection vulnerability in the Wordpress plugin wp-database-backup for versions less than 5.2. For the backup functionality, the plugin generates a mysqldump command to execute. The user can choose specific tables to exclude from the backup by setting the...
  6. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  7. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  8. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    Ahsay Backup versions 7.x through 8.1.1.50 suffer from authenticated arbitrary file upload and remote code execution vulnerabilities. View the full article
  9. 1

    Exploits fuelCMS 1.4.1 Remote Code Execution

    fuelCMS versions 1.4.1 and below suffer from a remote code execution vulnerability. View the full article
  10. 1

    Exploits PHP Laravel Framework Token Unserialize Remote Command Execution

    This Metasploit module exploits a vulnerability in the PHP Laravel Framework for versions 5.5.40, 5.6.x up to 5.6.29. Remote command execution is possible via a correctly formatted HTTP X-XSRF-TOKEN header, due to an insecure unserialize call of the decrypt method in...
  11. 1

    Exploits Citrix SD-WAN Appliance 10.2.2 Authentication Bypass / Remote Command Execution

    Citrix SD-WAN Appliance version 10.2.2 suffers from authentication bypass and remote command execution vulnerabilities. View the full article
  12. 1

    Exploits Xymon useradm Command Execution

    This Metasploit module exploits a command injection vulnerability in Xymon versions before 4.3.25 which allows authenticated users to execute arbitrary operating system commands as the web server user. When adding a new user to the system via the web interface with useradm.sh, the user's...
  13. 1

    Exploits Cisco Data Center Network Manager 11.1(1) Remote Code Execution

    Cisco Data Center Network Manager (DCNM) versions 11.1(1) and below suffer from authentication bypass, arbitrary file upload, arbitrary file download, and information disclosure vulnerabilities. View the full article
  14. 1

    Exploits Microsoft Exchange 2003 base64-MIME Remote Code Execution

    Microsoft Exchange 2003 base64-MIME remote code execution exploit. View the full article
  15. 1

    Exploits Apache Tomcat CGIServlet enableCmdLineArguments Remote Code Execution

    This Metasploit module exploits a vulnerability in Apache Tomcat's CGIServlet component. When the enableCmdLineArguments setting is set to true, a remote user can abuse this to execute system commands, and gain remote code execution. View the full article
  16. 1

    Exploits Centreon 19.04 Remote Code Execution

    Centreon version 19.04 suffers from an authenticated remote code execution vulnerability. View the full article
  17. 1

    Exploits EA Origin Template Injection Remote Code Execution

    EA Origin versions prior to 10.5.36 suffer from a remote code execution vulnerability via template injection leveraging cross site scripting. View the full article
  18. 1

    Exploits Google Chrome JS Execution Use-After-Free

    JS execution inside ScriptForbiddenScope can lead to a use-after-free condition in Google Chrome. View the full article
  19. 1

    Exploits LibreNMS 1.46 addhost Remote Code Execution

    LibreNMS version 1.46 addhost remote code execution exploit. View the full article
  20. 1

    Exploits Nagios XI Magpie_debug.php Root Remote Code Execution

    This Metasploit module exploits two vulnerabilities in Nagios XI 5.5.6. One allows for unauthenticated remote code execution and another allows for local privilege escalation. When combined, these two vulnerabilities give us a root reverse shell. View the full article
Back
Top