This Metasploit module exploits an unauthenticated PHP command injection vulnerability in GLPI versions 10.0.2 and below to execute a command.
>> CATEGORY: exploit
Backdoor.Win32.Delf.arh malware suffers from an authentication bypass vulnerability.
Pega Platform versions 8.1.0 through 8.7.3 suffer from a remote code execution vulnerability. If an on-premise installation of the Pega Platform is configured with the port for the JMX interface…
Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.
Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.
Chrome suffers from a heap buffer overflow vulnerability in offline_items_collection::OfflineContentAggregator::OnItemRemoved.
There is a vulnerability in Cisco Jabber that allows an attacker to send arbitrary XMPP stanzas (XMPP control messages) to another Cisco Jabber client, including XMPP stanzas that are normally…
Chrome suffers from a heap use-after-free vulnerability in AccountSelectionBubbleView::OnAccountImageFetched.
This Metasploit module creates a .tar file that can be emailed to a Zimbra server to exploit CVE-2022-41352. If successful, it plants a JSP-based backdoor in the public web directory,…
AVS Audio Converter version 10.3 suffers from a stack overflow vulnerability.