• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

execution

  1. 1

    Exploits BMC Patrol Agent Privilege Escalation / Command Execution

    This Metasploit module leverages the remote command execution feature provided by the BMC Patrol Agent software. It can also be used to escalate privileges on Windows hosts as the software runs as SYSTEM but only verifies that the password of the provided user is correct. This also means if the...
  2. 1

    Exploits Moodle 3.4.1 Remote Code Execution

    Moodle version 3.4.1 remote code execution exploit. View the full article
  3. 1

    Exploits Apache UNO API Remote Code Execution

    Apache UNO with LibreOffice version 6.1.2 and OpenOffice version 4.1.6 API remote code execution exploit. View the full article
  4. 1

    Exploits Pegasus CMS 1.0 Remote Code Execution

    Pegasus CMS version 1.0 suffers from a code execution vulnerability in extra_fields.php. View the full article
  5. 1

    Exploits FTPGetter Standard 5.97.0.177 Remote Code Execution

    FTPGetter Standard version 5.97.0.177 suffers from a remote code execution vulnerability. View the full article
  6. 1

    Exploits Microsoft Windows MSHTML Engine Edit Remote Code Execution

    The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc). View the full article
  7. 1

    Exploits NREL BEopt 2.8.0 Insecure Library Loading Arbitrary Code Execution

    BEopt suffers from a DLL Hijacking issue. The vulnerability is caused due to the application loading libraries (sdl2.dll and libegl.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into opening a related application file .BEopt located on a remote...
  8. 1

    Exploits Liferay CE Portal Groovy-Console Remote Command Execution

    This Metasploit module uses the Liferay CE Portal Groovy script console to execute OS commands. The Groovy script can execute commands on the system via a [command].execute() call. Valid credentials for an application administrator user account are required. This module has been tested...
  9. 1

    Exploits PRTG Network Monitor 18.2.38 Remote Code Execution

    PRTG Network Monitor version 18.2.38 authenticated remote code execution exploit. View the full article
  10. 1

    Exploits OpenKM Document Management Remote Command Execution

    This Metasploit module allows the execution of remote commands on the server by creating a malicious JSP file. Module has been tested successfully with OpenKM DM between 6.3.2 and 6.3.7 on Debian 4.9.18-1kali1 system. There is also the possibility of working in lower versions. View the full article
  11. 1

    Exploits Flexpaper 2.3.6 Remote Code Execution

    Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability. View the full article
  12. 1

    Exploits Sony PlayStation 4 WebKit Code Execution

    Sony PlayStation 4 (PS4) versions prior to 6.20 webkit code execution proof of concept exploit. View the full article
  13. 1

    Exploits Oracle Weblogic Server Deserialization Remote Command Execution

    Oracle Weblogic Server deserialization remote command execution exploit with patch bypass. View the full article
  14. 1

    Exploits QNAP TS-431 QTS Remote Command Execution

    This Metasploit module creates a virtual web server and uploads the php payload into it. Admin privileges cannot access any server files except File Station files. The user who is authorized to create Virtual Web Server can upload malicious php file by activating the server. Exploit creates a...
  15. 1

    Exploits phpBB 3.2.3 Remote Code Execution

    phpBB version 3.2.3 remote code execution exploit. View the full article
  16. 1

    Exploits Drupal RESTful Web Services unserialize() Remote Code Execution

    This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services by sending a crafted request to the /node REST endpoint. As per SA-CORE-2019-003, the initial remediation was to disable POST, PATCH, and PUT, but Ambionics discovered that GET was also vulnerable...
  17. 1

    Exploits Java Debug Wire Protocol Remote Code Execution

    Java Debug Wire Protocol (JDWP) remote code execution exploit. View the full article
  18. 1

    Exploits Splunk Enterprise 7.2.4 Remote Code Execution

    Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload. View the full article
  19. 1

    Exploits Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 Remote Code Execution

    Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 remote code execution proof of concept exploit. View the full article
  20. 1

    Exploits Booked Scheduler 2.7.5 Remote Command Execution

    This Metasploit module exploits a file upload vulnerability Booked 2.7.5. In the "Look and Feel" section of the management panel, you can modify the Logo-Favico-CSS files. Upload sections has file extension control except favicon part. You can upload the file with the extension you want through...
Back
Top