Search the Community
Showing results for tags 'authenticated'.
-
D-Link DWL-2600AP suffers from an authentication OS command injection vulnerability via the tftp restore functionality. View the full article
-
- d-link
- dwl-2600ap
-
(and 3 more)
Tagged with:
-
This Metasploit module exploits an arbitrary command execution vulnerability in Webmin 1.900 and lower versions. Any user authorized to the "Upload and Download" module can execute arbitrary commands with root privileges. In addition, if the Running Processes (proc) privilege is set the user can accurately determine which directory to upload to. Webmin application files can be written/overwritten, which allows remote code execution. The module has been tested successfully with Webmin 1.900 on Ubuntu v18.04. View the full article
-
The COMMITCONFIG verb is used by a CMS client to upload and modify the configuration of the CMS Server. The vulnerability is in the FileName parameter, which accepts directory traversal (..\\..\\) characters. Therefore, this function can be abused to overwrite any files in the installation drive of CMS Server. This vulnerability is exploitable in CMS versions up to and including 2.4. View the full article
-
phpMyAdmin version 4.8.1 authenticated local file inclusion proof of concept exploits. View the full article
-
- 1
-
- phpmyadmin
- 4.8.1
-
(and 4 more)
Tagged with:
-
This Metasploit module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request against the UPM component. The check command will test the validity of user supplied credentials and test for access to the plugin manager. View the full article
-
Exploits WebExec Authenticated User Code Execution
1337day-Exploits posted a topic in Updated Exploits
This Metasploit module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" module, except allows any non-guest account by default. View the full article