Command Injection exploit for Chamilo with auto upload shell. Use logic to check path directory for vulnerability, then find access shells `wso.php`
Reporter | Title | Published | Views | Family All 26 |
---|---|---|---|---|
![]() | Exploit for Command Injection in Chamilo | 22 Jul 202305:27 | – | githubexploit |
![]() | Exploit for CVE-2023-34960 | 18 Jul 202303:39 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 1 Aug 202308:09 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 3 Jul 202311:17 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 9 Jul 202311:24 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 13 Jul 202408:30 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 22 Jul 202305:27 | – | githubexploit |
![]() | Exploit for Command Injection in Chamilo | 9 Jun 202310:32 | – | githubexploit |
![]() | CVE-2023-34960 | 1 Aug 202300:00 | – | vulnrichment |
![]() | CVE-2023-34960 | 1 Aug 202300:00 | – | cvelist |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo