Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about SugarCRM Remote Code Execution Exploit Update
This update adds support for Solaris and Mac OS X platforms
Read more about OpenX Remote Code Execution Exploit Update
This update adds support for Solaris and Mac OS X platforms
Read more about Xoops mydirname Remote Code Execution Exploit Update
This update adds support for Solaris platform.
Read more about Oracle Java Rhino Script Engine Remote Code Execution Exploit
The Rhino Script Engine of Oracle Java fails to properly check for permissions on JavaScript error objects. This flaw allows an unprivileged applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.

Read more about Trend Micro InterScan Web Security Suite Privilege Escalation Exploit
This module exploits a local vulnerability in Trend Micro IWSS to gain elevated privileges on the affected computer.
Read more about Samba Username Map Script Command Injection Exploit
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the SamrChangePassword function, when the "username map script" smb.conf option is enabled.
Read more about e107 Install Script Command Injection Exploit
e107 CMS is vulnerable to a command injection in its installation script due to a lack of sanitization on the MySQL server parameter.
Read more about MyBB Backdoor Remote Code Execution Exploit
A backdoor introduced in the source code of MyBB allows remote unauthenticated attackers to execute arbitrary code on systems running vulnerable installations of MyBB.
Read more about phpScheduleit 1.2.10 Remote Code Execution Exploit Update
Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.

This update adds support for the Solaris and FreeBSD platforms.
Read more about Moodle Tex Filter Remote Code Execution Exploit Update
This module exploits a Moodle Tex Filter Remote Code Execution vulnerability installing an agent.

This update adds support for the Solaris platform.

Pagination

  • Previous page ‹‹
  • Page 40
  • Next page ››
Subscribe to Linux
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.