Browsing the "execution" Tag

Comodo Unified Threat Management Web Console 2.7.0 Remote Code Execution ≈ Packet Storm

September 23rd, 2020 📆 | 5587 Views ⚑

# Exploit Title: Comodo Unified Threat Management Web Console 2.7.0 – Remote Code Execution# Date: 2018-08-15# Exploit Author: Milad Fadavvi#

Tagged with:




Jenkins 2.56 CLI Deserialization / Code Execution ≈ Packet Storm

September 23rd, 2020 📆 | 4573 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerprepend Exploit::Remote::AutoCheck def

Tagged with:




B-swiss 3 Digital Signage System 3.6.5 Backdoor Remote Code Execution ≈ Packet Storm

September 22nd, 2020 📆 | 2244 Views ⚑

*]#!/usr/bin/env python3*]# -*- coding: utf-8 -*-*]#*]#*]# B-swiss 3 Digital Signage System 3.6.5 Backdoor Remote Code Execution*]#*]#*]# Vendor: B-Swiss SARL |

Tagged with:




SpamTitan 7.07 Remote Code Execution ≈ Packet Storm

September 19th, 2020 📆 | 6996 Views ⚑

# Exploit Title: SpamTitan 7.07 – Remote Code Execution (Authenticated)# Date: 2020-09-18# Exploit Author: Felipe Molina (@felmoltor)# Vendor Homepage: https://www.titanhq.com/spamtitan/spamtitangateway/#

Tagged with:




Microsoft SQL Server Reporting Services 2016 Remote Code Execution ≈ Packet Storm

September 18th, 2020 📆 | 7011 Views ⚑

# Exploit Title: Microsoft SQL Server Reporting Services 2016 – Remote Code Execution# Google Dork: inurl:ReportViewer.aspx# Date: 2020-09-17# Exploit Author:

Tagged with:




Microsoft Exchange Server DlpUtils AddTenantDlpPolicy Remote Code Execution ≈ Packet Storm

September 17th, 2020 📆 | 8582 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Powershell

Tagged with:




ManageEngine Applications Manager Authenticated Remote Code Execution ≈ Packet Storm

September 4th, 2020 📆 | 4976 Views ⚑

*]#!/usr/bin/python3*]# Exploit Title: ManageEngine Applications Manager – Authenticated RCE via Java class reflection in Weblogic server test credential API# Google

Tagged with: