OpenNetAdmin 18.1.1 Remote Command Execution
OpenNetAdmin versions 8.5.14 through 18.1.1 remote command execution exploit written in Ruby. This exploit was based on the original discovery of the issue by mattpascoe.
OpenNetAdmin versions 8.5.14 through 18.1.1 remote command execution exploit written in Ruby. This exploit was based on the original discovery of the issue by mattpascoe.
The javascript terminal emulator used by AWS CloudShell handles certain terminal escape codes incorrectly. This can lead to remote code execution if attacker controlled data is displayed in a CloudShell instance.
http://www.bpp1.go.th//images/fighter.gif notified by Royal Battler BD
Tags: defacementHuman Resource Information System 0.1 – ‘First Name’ Persistent Cross-Site Scripting (Authenticated)
Tags: 0day, remote exploit