Browsing the "code" Tag

LISTSERV Maestro 9.0-8 Remote Code Execution ≈ Packet Storm

October 21st, 2020 📆 | 2144 Views ⚑

Document Title: =============== LISTSERV Maestro Remote Code Execution Vulnerability References (Source): ==================== https://www.securifera.com/advisories/sec-2020-0001/ https://www.lsoft.com/products/maestro.asp Release Date: ============= 2020-10-20 Product &

Tagged with:




HiSilicon Video Encoder Malicious Firmware Code Execution ≈ Packet Storm

October 20th, 2020 📆 | 3067 Views ⚑

#!/usr/bin/env bash # Exploit Title: HiSilicon video encoders – RCE via unauthenticated upload of malicious firmware# Date: 2020-09-20# Exploit Author:

Tagged with:




ReQuest Serious Play F3 Media Server 7.0.3 Unauthenticated Remote Code Execution ≈ Packet Storm

October 20th, 2020 📆 | 3472 Views ⚑

#!/usr/bin/env python3# -*- coding: utf-8 -*-### ReQuest Serious Play F3 Media Server 7.0.3 Unauthenticated Remote Code Execution# # # Vendor:

Tagged with:




Microsoft SharePoint SSI / ViewState Remote Code Execution ≈ Packet Storm

October 19th, 2020 📆 | 3467 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::ViewStateinclude

Tagged with:




MedDream PACS Server 6.8.3.751 Remote Code Execution ≈ Packet Storm

October 3rd, 2020 📆 | 7317 Views ⚑

#!/usr/bin/python### Exploit Title: MedDream PACS Server 6.8.3.751 – Remote Code Execution (Authenticated)# Exploit Author: bzyo# Twitter: @bzyo_# Exploit Title: MedDream

Tagged with:




WebsiteBaker 2.12.2 Remote Code Execution ≈ Packet Storm

October 2nd, 2020 📆 | 5667 Views ⚑

# Exploit Title: WebsiteBaker 2.12.2 – Remote Code Execution# Date: 2020-07-04# Exploit Author: Selim Enes ‘Enesdex’ Karaduman# Vendor Homepage: https://websitebaker.org/pages/en/home.php#

Tagged with: