Browsing the "command" Tag

DLINK DWL-2600 Authenticated Remote Command Injection ↭

March 28th, 2020 📆 | 2220 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def initialize(info

Tagged with:




HP ThinPro 6.x / 7.x Privileged Command Injection ↭

March 26th, 2020 📆 | 4919 Views ⚑

HP ThinPro – Privileged command injection=============================================================================== Identifiers————————————————-* CVE-2019-18910 CVSSv3 score————————————————-7.6 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L) Vendor————————————————-HP – https://www.hp.com](https://www.hp.com) Product————————————————-Deliver secure desktop virtualization that’s as

Tagged with:




HP ThinPro 6.x / 7.x Citrix Command Injection ↭

March 26th, 2020 📆 | 6707 Views ⚑

HP ThinPro – Citrix command injection=============================================================================== Identifiers————————————————-* CVE-2019-18909 CVSSv3 score————————————————-6.1 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) Vendor————————————————-HP – https://www.hp.com](https://www.hp.com) Product————————————————-Deliver secure desktop virtualization that’s as

Tagged with:




UCM6202 1.0.18.13 Remote Command Injection ↭

March 24th, 2020 📆 | 1908 Views ⚑

# Exploit Title: UCM6202 1.0.18.13 – Remote Command Injection# Date: 2020-03-23# Exploit Author: Jacob Baines# Vendor: http://www.grandstream.com# Product Link: http://www.grandstream.com/products/ip-pbxs/ucm-series-ip-pbxs/product/ucm6200-series#

Tagged with:




Centreon Poller Authenticated Remote Command Execution ↭

March 19th, 2020 📆 | 7546 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::CmdStagerinclude Msf::Exploit::Remote::HttpClient def initialize(info

Tagged with:




Phoenix Contact TC Router / TC Cloud Client Command Injection ≈ Packet Storm

March 14th, 2020 📆 | 1948 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20200312-0 >=======================================================================title: Authenticated Command Injectionproduct: Phoenix Contact TC Router & TC Cloud Clientvulnerable

Tagged with:




Nagios XI Authenticated Remote Command Execution ≈ ↲

March 10th, 2020 📆 | 4916 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankinginclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def initialize(info =

Tagged with:




EyesOfNetwork – AutoDiscovery Target Command Execution (Metasploit)

March 6th, 2020 📆 | 6550 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include

Tagged with:




EyesOfNetwork AutoDiscovery Target Command Execution ≈ ↲

March 3rd, 2020 📆 | 7951 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankinginclude Msf::Exploit::Remote::HttpClient def initialize(info = {})super(update_info(info,‘Name’

Tagged with: