Browsing the "command" Tag

Pepperl+Fuchs IO-Link Master Series 1.36 CSRF / XSS / Command Injection ≈ Packet Storm

January 16th, 2021 📆 | 7247 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20210113-0 >=======================================================================title: Multiple vulnerabilitiesproduct: Pepperl+Fuchs IO-Link Master SeriesSee “Vulnerable / tested versions”vulnerable version:

Tagged with:




Online Learning Management System 1.0 Remote Command Execution ≈ Packet Storm

January 6th, 2021 📆 | 1733 Views ⚑

# Exploit Title: Online Learning Management System 1.0 – RCE (Authenticated)# Date: 01.01.2021# Exploit Author: Bedri Sertkaya# Vendor Homepage: https://www.sourcecodester.com/php/7339/learning-management-system.html#

Tagged with:




SpamTitan 7.07 Command Injection ≈ Packet Storm

January 6th, 2021 📆 | 7174 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = NormalRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::SNMPClientinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager

Tagged with:




Webmin 1.962 Remote Command Execution ≈ Packet Storm

December 23rd, 2020 📆 | 5647 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info =

Tagged with:




Rejetto HttpFileServer 2.3.x Remote Command Execution ≈ Packet Storm

December 1st, 2020 📆 | 6983 Views ⚑

# Exploit Title: Rejetto HttpFileServer 2.3.x – Remote Command Execution (3)# Google Dork: intext:”httpfileserver 2.3″# Date: 28-11-2020# Remote: Yes# Exploit

Tagged with:




ZeroShell 3.9.0 Remote Command Execution ≈ Packet Storm

November 26th, 2020 📆 | 5038 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def

Tagged with:




Critical VMware Zero-Day Bug Allows Command Injection

November 24th, 2020 📆 | 3217 Views ⚑

Critical VMware Zero-Day Bug Allows Command Injection Source link

Tagged with:




ZeroShell 3.9.0 – ‘cgi-bin/kerbynet’ Remote Root Command Injection (Metasploit)

November 24th, 2020 📆 | 1640 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include

Tagged with:




Gemtek WVRTM-127ACN 01.01.02.141 Command Injection ≈ Packet Storm

November 19th, 2020 📆 | 5402 Views ⚑

*]# Exploit Title: Gemtek WVRTM-127ACN 01.01.02.141 – Authenticated Arbitrary Command Injection *]# Date: 13/09/2020 *]# Exploit Author: Gabriele Zuddas *]#

Tagged with: