Browsing the "execution" Tag

SLMail 5.1.0.4420 Remote Code Execution ≈ Packet Storm

February 25th, 2021 📆 | 5060 Views ⚑

# -*- coding: utf-8 -*-import socketfrom time import sleepfrom os import system system(“clear”)print ‘Shell-code-foi-informada?rn’print ‘1] sim’print ‘2] naon’quest = int(input(‘>>>

Tagged with:




Unified Remote 3.9.0.2463 Remote Code Execution ≈ Packet Storm

February 24th, 2021 📆 | 1751 Views ⚑

# Exploit Title: Unified Remote 3.9.0.2463 – Remote Code Execution# Author: H4rk3nz0# Vendor Homepage: https://www.unifiedremote.com/# Software Link: https://www.unifiedremote.com/download# Tested on:

Tagged with:




Apache Flink JAR Upload Java Code Execution ≈ Packet Storm

February 23rd, 2021 📆 | 2256 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck def initialize(info

Tagged with:




Backdoor.Win32.Agent.aak Code Execution / Cross Site Request Forgery ≈ Packet Storm

February 18th, 2021 📆 | 5815 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/64f2fd4dbd9039e5bc054f475eaa582a_B.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Agent.aakVulnerability: Cross Site Request Forgery (CSRF) –

Tagged with:




IrfanView 4.57 Denial Of Service / Code Execution ≈ Packet Storm

February 17th, 2021 📆 | 8516 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20210217-0 >=======================================================================title: Multiple Vulnerabilitiesproduct: IrfanView – WPG.dll pluginvulnerable version: IrfanView 4.57/WPG.dll version 2.0.0.0fixed

Tagged with:




Backdoor.Win32.Augudor.a Code Execution ≈ Packet Storm

February 12th, 2021 📆 | 6570 Views ⚑

Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/1b557d4f923b0de75e397686053a9022.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Augudor.aVulnerability: Unauthenticated Remote File Write Code ExecutionDescription:

Tagged with:




Micro Focus Operations Bridge Manager Remote Code Execution ≈ Packet Storm

February 10th, 2021 📆 | 5169 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::Java::HTTP::ClassLoaderprepend Msf::Exploit::Remote::AutoCheckdef

Tagged with: