This Metasploit module exploits a vulnerability on Microsoft Exchange Server that allows an attacker to bypass the authentication, impersonate an arbitrary user, and write an arbitrary file to achieve remote code execution. By taking advantage of this vulnerability, you can execute arbitrary commands on the remote Microsoft Exchange Server. This vulnerability affects Exchange 2013 CU23 versions before 15.0.1497.15, Exchange 2016 CU19 versions before 15.1.2176.12, Exchange 2016 CU20 versions before 15.1.2242.5, Exchange 2019 CU8 versions before 15.2.792.13, and Exchange 2019 CU9 versions before 15.2.858.9.
b555cd3b9862ec567195ff3003e6dc453483630a7c663ee17d582778c11dbf59
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
7ca34b8bb24ae9e50f33792b7091b3841d7e1b440ff57bc9fabddf01e2ed1e24
Online Traffic Offense Management System version 1.0 suffers from a remote SQL injection vulnerability.
f9ccba82b5fdd1c9551054d088cf435b9bc6b76ee2e32391e649fd8187bbf7d4
NetModule Router Software versions prior to 4.3.0.113, 4.4.0.111, and 4.5.0.105 suffer from insecure password handling and session fixation vulnerabilities.
55c2cd76e6eb849928d497ed398e7ef24c35c003556aab944b5829e79cdf8dc6
Laundry Booking Management System version 1.0 suffers from a remote SQL injection vulnerability.
0fa0ccd80f12ed76e46cdbfcbea69df5b713a5b2328737991110a18be7c9cb0a
Laundry Booking Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
6235f0245770ffeb2d12c3b8443b6185676520853eac459c2cb573980dc42ee0