Daniel Mende

3 exploits Active since Nov 2020
CVE-2020-24719 METASPLOIT CRITICAL ruby WORKING POC
Couchbase Server < 6.6.0 - OS Command Injection
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
CVSS 9.8
EIP-2026-103898 EXPLOITDB ruby WORKING POC
Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)
EIP-2026-103899 EXPLOITDB ruby WORKING POC
Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)