• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

execution

  1. 1

    Exploits PHP-Fusion 9.03.00 Remote Code Execution

    This Metasploit module exploits a command execution vulnerability in PHP-Fusion versions 9.03.00 and below. It is possible to execute commands in the system with ordinary user authority. View the full article
  2. 1

    Exploits Firefly CMS 1.0 Remote Command Execution

    Firefly CMS version 1.0 suffers from a remote command execution vulnerability. View the full article
  3. 1

    Exploits PostgreSQL COPY FROM PROGRAM Command Execution

    Installations running Postgres 9.3 and above have functionality which allows for the superuser and users with 'pg_execute_server_program' to pipe to and from an external program using COPY. This allows arbitrary command execution as though you have console access. This module attempts to create...
  4. 1

    Exploits Oracle Weblogic Server Deserialization Remote Code Execution

    An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. View the full article
  5. 1

    Exploits ReadyAPI 2.5.0 / 2.6.0 Remote Code Execution

    ReadyAPI versions 2.5.0 and 2.6.0 suffer from a remote code execution vulnerability. View the full article
  6. 1

    Exploits LG Supersign EZ CMS Remote Code Execution

    LG SuperSign EZ CMS, that many LG SuperSign TVs have built-in, is prone to a remote code execution vulnerability due to an improper parameter handling. View the full article
  7. 1

    Exploits Wordpress Social Warfare Remote Code Execution

    WordPress Social Warfare plugin versions prior to 3.5.3 suffer from a remote code execution vulnerability. View the full article
  8. 1

    Exploits Blue Angel Software Suite Command Execution

    Blue Angel Software Suite suffers from a command execution vulnerability. View the full article
  9. 1

    Exploits Windows PowerShell ISE / Filename Parsing Flaw Remote Code Execution

    Microsoft Windows PowerShell ISE will execute wrongly supplied code when debugging specially crafted PowerShell scripts that contain array brackets as part of the filename. This can result in ISE executing attacker supplied scripts pointed to by the filename and not the "trusted" PS file...
  10. 1

    Exploits Ruby On Rails DoubleTap Development Mode secret_key_base Remote Code Execution

    This Metasploit module exploits a vulnerability in Ruby on Rails. In development mode, a Rails application would use its name as the secret_key_base, and can be easily extracted by visiting an invalid resource for a path. As a result, this allows a remote user to create and deliver a signed...
  11. 1

    Exploits Domoticz 4.10577 Unauthenticated Remote Command Execution

    Domoticz versions 4.10577 and below suffer from an unauthenticated remote command execution vulnerability. View the full article
  12. 1

    Exploits AIS Logistics ESEL-Server SQL Injection / Code Execution

    This Metasploit module will execute an arbitrary payload on an "ESEL" server used by the AIS logistic software. The server typically listens on port 5099 without TLS. There could also be server listening on 5100 with TLS but the port 5099 is usually always open. The login process is vulnerable...
  13. 1

    Exploits Pimcore Unserialize Remote Code Execution

    This Metasploit module exploits a PHP unserialize() in Pimcore before 5.7.1 to execute arbitrary code. An authenticated user with "classes" permission could exploit the vulnerability. The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method makes it possible to...
  14. 1

    Exploits Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution

    An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an...
  15. 1

    Exploits RARLAB WinRAR ACE Format Input Validation Remote Code Execution

    In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as...
  16. 1

    Exploits ManageEngine Applications Manager 14 SQL Injection / Remote Code Execution

    This Metasploit module exploits SQL injection and command injection vulnerabilities in ManageEngine AM 14 and prior versions. An unauthenticated user can gain the authority of "system" on the server due to the SQL injection vulnerability. The exploit allows the writing of the desired file to the...
  17. 1

    Exploits Evernote 7.9 Path Traversal / Code Execution

    Evernote version 4.9 suffers from a path traversal that can allow for code execution. View the full article
  18. 1

    Exploits LibreOffice Macro Code Execution

    This Metasploit module generates an ODT file with a mouse over event that when triggered, will execute arbitrary code. View the full article
  19. 1

    Exploits RemoteMouse 3.008 Arbitrary Remote Command Execution

    RemoteMouse version 3.008 suffers from an arbitrary remote command execution vulnerability. View the full article
  20. 1

    Exploits CuteNews 2.1.2 Remote Code Execution

    This Metasploit module exploits a command execution vulnerability in CuteNews prior to version 2.1.2. The attacker can infiltrate the server through the avatar upload process in the profile area. There is no realistic control of the $imgsize function in "/core/modules/dashboard.php" Header...
Back
Top