Gila CMS 2.0.0 – Remote Code Execution (Unauthenticated)
January 13th, 2021 📆 | 7074 Views ⚑
# Exploit Title: Gila CMS 2.0.0 - Remote Code Execution (Unauthenticated) # Date: 1.12.2021 # Exploit Author: Enesdex # Vendor
January 13th, 2021 📆 | 7074 Views ⚑
# Exploit Title: Gila CMS 2.0.0 - Remote Code Execution (Unauthenticated) # Date: 1.12.2021 # Exploit Author: Enesdex # Vendor
January 10th, 2021 📆 | 6291 Views ⚑
*] *]# Exploit Title: Klog Server 2.4.1 - Command Injection (Unauthenticated) # Date: 22.12.2020 # Exploit Author: b3kc4t (Mustafa GUNDOGDU)
January 9th, 2021 📆 | 4809 Views ⚑
# Exploit Title: Resumes Management and Job Application Website 1.0 - RCE (Unauthenticated) # Date: 3/1/2021 # Exploit Author: Arnav
January 9th, 2021 📆 | 6360 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include
January 8th, 2021 📆 | 7983 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner
January 8th, 2021 📆 | 1829 Views ⚑
# Exploit Title: Cockpit Version 234 - Server-Side Request Forgery (Unauthenticated) # Date: 08.01.2021 # Exploit Author: Metin Yunus Kandemir
December 25th, 2020 📆 | 7417 Views ⚑
# Exploit Title: TerraMaster TOS 4.2.06 - RCE (Unauthenticated) # Date: 12/12/2020 # Exploit Author: IHTeam # Full Write-up: https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
December 24th, 2020 📆 | 6294 Views ⚑
# Exploit Title: WordPress Epsilon Framework Multiple Themes - Unauthenticated Function Injection # Date: 22/12/2020 # Exploit Authors: gx1 lotar
December 23rd, 2020 📆 | 5087 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include
December 22nd, 2020 📆 | 8248 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include
December 20th, 2020 📆 | 7365 Views ⚑
# Exploit Title: Linksys RE6500 1.0.11.001 - Unauthenticated RCE # Date: 31/07/2020 # Exploit Author: RE-Solver # Public disclosure: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html#4
December 19th, 2020 📆 | 7335 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HTTP::Wordpress
December 5th, 2020 📆 | 5963 Views ⚑
# Exploit Title: Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion # Date: 20.09.2020 # Exploit Author: LiquidWorm
December 4th, 2020 📆 | 6963 Views ⚑
# Exploit Title: WordPress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) # Date: 03/12/2020 # Exploit Author: Pankaj Verma (_p4nk4j)
December 3rd, 2020 📆 | 6869 Views ⚑
Sony BRAVIA Digital Signage 1.7.8 Unauthenticated Remote File Inclusion Vendor: Sony Electronics Inc.Product web page: https://pro-bravia.sony.nethttps://pro-bravia.sony.net/resources/software/bravia-signage/https://pro.sony/ue_US/products/display-softwareAffected version: < =1.7.8 Summary:
December 1st, 2020 📆 | 6813 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-27 #
November 27th, 2020 📆 | 7807 Views ⚑
# Exploit Title: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF # Date: 2020-07-30 # Author: Julien Ahrens #
November 26th, 2020 📆 | 7955 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = GoodRanking include Msf::Exploit::Remote::HTTP::Wordpressprepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::FileDropper def
November 20th, 2020 📆 | 2666 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Powershellinclude Msf::Exploit::Remote::HttpServerinclude Msf::Exploit::Remote::HttpClient def
November 19th, 2020 📆 | 2860 Views ⚑
# Exploit Title: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification # Google Dork: intitle:"Please Login" "Use FTM
Comments