Browsing the "root" Tag

Netsia SEBA+ 0.16.1 Authentcation Bypass / Add Root User ≈ Packet Storm

January 15th, 2021 📆 | 7256 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Auxiliaryinclude Msf::Exploit::Remote::HttpClient def initialize(info = {})super(update_info(info,‘Name’ => ‘Netsia

Tagged with:




Solaris SunSSH 11.0 x86 libpam Remote Root ≈ Packet Storm

December 16th, 2020 📆 | 2873 Views ⚑

# Exploit Title: Solaris SunSSH 11.0 x86 – libpam Remote Root # Exploit Author: Hacker Fantastic# Vendor Homepage: https://www.oracle.com/solaris/technologies/solaris11-overview.html# Version:

Tagged with:




ZeroShell 3.9.0 – ‘cgi-bin/kerbynet’ Remote Root Command Injection (Metasploit)

November 24th, 2020 📆 | 4140 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include

Tagged with:




Adtec Digital Products Hardcoded Credentials / Remote Root ≈ Packet Storm

October 28th, 2020 📆 | 5478 Views ⚑

# Exploit Title: Adtec Digital Multiple Products – Default Hardcoded Credentials Remote Root# Date: 2020-07-24# Exploit Author: LiquidWorm# Software Link:

Tagged with:




WISeKey’s Digital Identity for People and Objects Ecosystem is Expanding Exponentially as its Semiconductor Install Base Grows to 1.6 Billion Secure Chips and Root of Trust to 5 Billion Devices

June 10th, 2020 📆 | 2695 Views ⚑

WISeKey’s Digital Identity for People and Objects Ecosystem is Expanding Exponentially as its Semiconductor Install Base Grows to 1.6 Billion

Tagged with:




Cayin Signage Media Player 3.0 Root Remote Command Injection ≈ Packet Storm

June 5th, 2020 📆 | 7069 Views ⚑

#!/usr/bin/env python3### Cayin Signage Media Player 3.0 Root Remote Command Injection### Vendor: CAYIN Technology Co., Ltd.# Product web page: https://www.cayintech.com#

Tagged with: