January 16th, 2021 📆 | 7247 Views ⚑
SEC Consult Vulnerability Lab Security Advisory < 20210113-0 >=======================================================================title: Multiple vulnerabilitiesproduct: Pepperl+Fuchs IO-Link Master SeriesSee “Vulnerable / tested versions”vulnerable version:
January 10th, 2021 📆 | 8014 Views ⚑
*] *]# Exploit Title: Klog Server 2.4.1 - Command Injection (Unauthenticated) # Date: 22.12.2020 # Exploit Author: b3kc4t (Mustafa GUNDOGDU)
January 6th, 2021 📆 | 7764 Views ⚑
*]# Exploit Title: Klog Server 2.4.1 – Command Injection (Unauthenticated)*]# Date: 22.12.2020*]# Exploit Author: b3kc4t (Mustafa GUNDOGDU)*]# Vendor Homepage: https://www.klogserver.com/*]#
January 6th, 2021 📆 | 1733 Views ⚑
# Exploit Title: Online Learning Management System 1.0 – RCE (Authenticated)# Date: 01.01.2021# Exploit Author: Bedri Sertkaya# Vendor Homepage: https://www.sourcecodester.com/php/7339/learning-management-system.html#
January 6th, 2021 📆 | 7174 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = NormalRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::SNMPClientinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager
December 23rd, 2020 📆 | 5647 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info =
December 22nd, 2020 📆 | 4796 Views ⚑
# Exploit Title: SCO Openserver 5.0.7 – ‘outputform’ Command Injection# Google Dork: inurl:/cgi-bin/manlist?section# Discovered Date: 04/09/2020# Author: Ramikan# Vendor Homepage:
December 21st, 2020 📆 | 5678 Views ⚑
# Exploit Title: SCO Openserver 5.0.7 - 'outputform' Command Injection # Google Dork: inurl:/cgi-bin/manlist?section # Discovered Date: 04/09/2020 # Author:
December 14th, 2020 📆 | 5482 Views ⚑
# Exploit Title: Seacms 11.1 - 'ip and weburl' Remote Command Execution # Date: 20201212 # Exploit Author: j5s #
December 11th, 2020 📆 | 2425 Views ⚑
ROBINS AIR FORCE BASE, Ga. — The Defense Department’s new Controlled Unclassified Information program stood up in July 2020 with
December 1st, 2020 📆 | 6983 Views ⚑
# Exploit Title: Rejetto HttpFileServer 2.3.x – Remote Command Execution (3)# Google Dork: intext:”httpfileserver 2.3″# Date: 28-11-2020# Remote: Yes# Exploit
November 30th, 2020 📆 | 1893 Views ⚑
# Exploit Title: Rejetto HttpFileServer 2.3.x - Remote Command Execution (3) # Google Dork: intext:"httpfileserver 2.3" # Date: 28-11-2020 #
November 26th, 2020 📆 | 5038 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def
November 24th, 2020 📆 | 3217 Views ⚑
Critical VMware Zero-Day Bug Allows Command Injection Source link
November 24th, 2020 📆 | 1640 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include
November 21st, 2020 📆 | 7554 Views ⚑
# Exploit Title: Aerospike Database 5.1.0.3 - OS Command Execution # Date: 2020-08-01 # Exploit Author: Matt S # Vendor
November 20th, 2020 📆 | 8386 Views ⚑
# Exploit Title: IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow #
November 20th, 2020 📆 | 7927 Views ⚑
*] *]# Exploit Title: Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection # Date: 13/09/2020 # Exploit Author: Gabriele Zuddas
November 19th, 2020 📆 | 5402 Views ⚑
*]# Exploit Title: Gemtek WVRTM-127ACN 01.01.02.141 – Authenticated Arbitrary Command Injection *]# Date: 13/09/2020 *]# Exploit Author: Gabriele Zuddas *]#
November 17th, 2020 📆 | 5943 Views ⚑
# Exploit Title: Aerospike Database 5.1.0.3 – OS Command Execution# Date: 2020-08-01# Exploit Author: Matt S# Vendor Homepage: https://www.aerospike.com/# Version:
Comments