This Metasploit module exploits a file upload in VMware vCenter Server’s analytics/telemetry (CEIP) service to write a system crontab and execute shell commands as the root user. Note that CEIP must be enabled for the target to be exploitable by this module. CEIP is enabled by default.
Online Employees Work From Home Attendance System 1.0 – SQLi Authentication Bypass
Tags:
0day,
remote exploit
Online Enrollment Management System 1.0 – Authentication Bypass
Tags:
0day,
remote exploit
Simple Online College Entrance Exam System 1.0 – Account Takeover
Tags:
0day,
remote exploit
Simple Online College Entrance Exam System 1.0 – Unauthenticated Admin Creation
Tags:
0day,
remote exploit
WordPress Plugin Pie Register 3.7.1.4 – Admin Privilege Escalation (Unauthenticated)
Tags:
0day,
remote exploit
django-unicorn 0.35.3 – Stored Cross-Site Scripting (XSS)
Tags:
0day,
remote exploit
Maian-Cart 3.8 – Remote Code Execution (RCE) (Unauthenticated)
Tags:
0day,
remote exploit
IFSC Code Finder Project 1.0 – SQL injection (Unauthenticated)
Tags:
0day,
remote exploit
Online Traffic Offense Management System 1.0 – Privilage escalation (Unauthenticated)
Tags:
0day,
remote exploit