appsec.fyi

Remote Code Execution (RCE) Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Remote Code Execution (RCE)

Remote Code Execution (RCE) is the ability for an attacker to execute arbitrary commands or code on a target machine or process. RCE vulnerabilities represent the most critical class of security bugs — they give an attacker the same level of control as a system administrator.

RCE can manifest through many different attack vectors. Command injection occurs when user input is passed unsanitized to system shell commands. Deserialization attacks exploit unsafe object reconstruction in languages like Java, PHP, Python, and .NET. Server-Side Template Injection (SSTI) allows code execution through template engines like Jinja2, Twig, or Freemarker. File upload vulnerabilities can lead to RCE when executable files bypass upload filters and are served by the web server.

In modern applications, RCE often appears in less obvious places: expression language injection in Java frameworks, prototype pollution leading to code execution in Node.js, unsafe use of eval() or dynamic code loading, and vulnerabilities in PDF generators, image processors, and other libraries that shell out to system commands.

RCE bugs consistently command the highest payouts in bug bounty programs because the impact is total system compromise. Chaining lower-severity bugs into RCE — such as SSRF to cloud metadata to code execution — is a common and highly rewarded approach.

This page collects RCE techniques, exploitation writeups, and research across all major platforms and languages.

From Wikipedia

Date Added Link Excerpt
2026-04-10 NEW 2026U-Office Force Critical RCE via Insecure Deserialization (CVE-2026-3422)U-Office Force Critical RCE via Insecure Deserialization (CVE-2026-3422)
2026-04-10 NEW 2026IBM Langflow Desktop RCE via Insecure DeserializationIBM Langflow Desktop RCE via Insecure Deserialization
2026-04-10 NEW 2026CVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n WebhooksCVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n Webhooks
2026-04-10 NEW 2026Potentially Critical RCE in OpenSSL (CVE-2025-15467)Potentially Critical RCE in OpenSSL (CVE-2025-15467)
2026-04-10 NEW 2026Wazuh RCE via Deserialization of Untrusted Data (CVE-2026-25769)Wazuh RCE via Deserialization of Untrusted Data (CVE-2026-25769)
2026-04-10 NEW 2026CVE-2025-55182: React and Next.js Deserialization RCE Deep DiveCVE-2025-55182: React and Next.js Deserialization RCE Deep Dive
2026-04-10 NEW 2026Active Exploitation of 7-Zip RCE VulnerabilityActive Exploitation of 7-Zip RCE Vulnerability
2026-04-10 NEW 2026Update on React Server Components RCE (CVE-2025-55182 / CVE-2025-66478)Update on React Server Components RCE (CVE-2025-55182 / CVE-2025-66478)
2026-04-10 NEW 2026CVE-2025-34291 Exploited in the Wild: LangFlow AI Under FireCVE-2025-34291 Exploited in the Wild: LangFlow AI Under Fire
2026-04-10 NEW 2026New runC Vulnerabilities Expose Docker and Kubernetes to Container EscapeNew runC Vulnerabilities Expose Docker and Kubernetes to Container Escape
2026-04-10 NEW 2026What Is SSTI in Golang? Server-Side Template Injection SecurityWhat Is SSTI in Golang? Server-Side Template Injection Security
2026-04-10 NEW 2026CVE-2025-39601: WordPress Custom CSS, JS and PHP Plugin CSRF to RCECVE-2025-39601: WordPress Custom CSS, JS and PHP Plugin CSRF to RCE
2026-04-10 NEW 2026CVE-2025-7384: Critical WordPress Plugin Unauthenticated RCECVE-2025-7384: Critical WordPress Plugin Unauthenticated RCE
2026-04-10 NEW 2026Sneeit WordPress RCE Exploited in the WildSneeit WordPress RCE Exploited in the Wild
2026-04-10 NEW 2026Critical Pre-Auth RCE in ChurchCRM Setup WizardCritical Pre-Auth RCE in ChurchCRM Setup Wizard
2026-04-10 NEW 2026Critical Unauthenticated RCE in n8n (CVE-2026-21858, CVSS 10.0)Critical Unauthenticated RCE in n8n (CVE-2026-21858, CVSS 10.0)
2026-04-10 NEW 2026TryHackMe Spring AI: CVE-2026-22738 RCE WriteupTryHackMe Spring AI: CVE-2026-22738 RCE Writeup
2026-04-10 NEW 2026Dangerous runC Flaws Allow Hackers to Escape Docker ContainersDangerous runC Flaws Allow Hackers to Escape Docker Containers
2026-04-10 NEW 2026runC Container Escape Vulnerabilities: A Technical OverviewrunC Container Escape Vulnerabilities: A Technical Overview
2026-04-10 NEW 2026New runC Vulnerabilities Allow Container Escape in Docker and KubernetesNew runC Vulnerabilities Allow Container Escape in Docker and Kubernetes
2026-04-10 NEW 2026Attackers Exploit Critical Langflow RCE as CISA Sounds AlarmAttackers Exploit Critical Langflow RCE as CISA Sounds Alarm
2026-04-10 NEW 2026CVE-2026-33017: How Attackers Compromised Langflow AI Pipelines in 20 HoursCVE-2026-33017: How Attackers Compromised Langflow AI Pipelines in 20 Hours
2026-04-10 NEW 2026CVE-2025-3248: RCE Vulnerability in LangflowCVE-2025-3248: RCE Vulnerability in Langflow
2026-04-10 NEW 2026React2Shell Explained: From Vulnerability Discovery to ExploitationReact2Shell Explained: From Vulnerability Discovery to Exploitation
2026-04-10 NEW 2026Protecting Against the Critical React2Shell RCE ExposureProtecting Against the Critical React2Shell RCE Exposure
2026-04-10 NEW 2026React2Shell: Node.js RCE Against a Production Next.js AppReact2Shell: Node.js RCE Against a Production Next.js App
2026-04-10 NEW 2026CVE-2025-68613: RCE via Expression Injection in n8nCVE-2025-68613: RCE via Expression Injection in n8n
2026-04-10 NEW 2026Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
2026-04-10 NEW 2026WWBN AVideo RCE via Persistent PHP File Upload (CVE-2026-33717)WWBN AVideo RCE via Persistent PHP File Upload (CVE-2026-33717)
2026-04-10 NEW 2026Explorance Blue RCE via Unrestricted File UploadExplorance Blue RCE via Unrestricted File Upload
2026-04-10 NEW 2026From Pre-Auth SSRF to RCE in TruFusion EnterpriseFrom Pre-Auth SSRF to RCE in TruFusion Enterprise
2026-04-10 NEW 2026Serverless Security Risks 2026: Mitigating SSRF and RCE ThreatsServerless Security Risks 2026: Mitigating SSRF and RCE Threats
2026-04-10 NEW 2026Intigriti Challenge: SSRF to RCE via File Upload BypassIntigriti Challenge: SSRF to RCE via File Upload Bypass
2026-04-10 NEW 2026Precurio Intranet Portal: CSRF to RCE via File UploadPrecurio Intranet Portal: CSRF to RCE via File Upload
2026-04-10 NEW 2026Tiandy Easy7 RCE via OS Command Injection (CVE-2026-4585)Tiandy Easy7 RCE via OS Command Injection (CVE-2026-4585)
2026-04-10 NEW 2026OpenMetadata RCE via SSTI in FreeMarker Email TemplatesOpenMetadata RCE via SSTI in FreeMarker Email Templates
2026-04-10 NEW 2026RCE in Airbyte via Server-Side Template Injection (SSTI)RCE in Airbyte via Server-Side Template Injection (SSTI)
2026-04-10 NEW 2026File Upload Vulnerability Testing: Bypassing Filters and Getting RCEFile Upload Vulnerability Testing: Bypassing Filters and Getting RCE
2026-04-10 NEW 2026Critical LFI to RCE in WP Ghost Plugin Affecting 200k+ SitesCritical LFI to RCE in WP Ghost Plugin Affecting 200k+ Sites
2026-04-10 NEW 2026AI Workflows Under Fire: Critical RCE Flaws in LangflowAI Workflows Under Fire: Critical RCE Flaws in Langflow
2026-04-10 NEW 2026CVE-2026-22812: RCE on a 71k-Star AI Coding Tool With Zero AuthCVE-2026-22812: RCE on a 71k-Star AI Coding Tool With Zero Auth
2026-04-10 NEW 2026Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)
2026-04-10 NEW 2026Lessons From 2025: Zero-Day Exploitation Shaping 2026Lessons From 2025: Zero-Day Exploitation Shaping 2026
2026-04-10 NEW 2026Critical Zero-Day RCE in Networking Devices Exposes 70,000+ HostsCritical Zero-Day RCE in Networking Devices Exposes 70,000+ Hosts
2026-04-10 NEW 2026Cisco Patches Zero-Day RCE Exploited by China-Linked APTCisco Patches Zero-Day RCE Exploited by China-Linked APT
2026-04-10 NEW 2026Critical Redis RCE Vulnerability: CVE-2025-49844Critical Redis RCE Vulnerability: CVE-2025-49844
2026-04-10 NEW 2026CVE-2025-59287: WSUS Unauthenticated RCE VulnerabilityCVE-2025-59287: WSUS Unauthenticated RCE Vulnerability
2026-04-10 NEW 2026Ivanti EPMM RCE Vulnerability Chain Exploited in the WildIvanti EPMM RCE Vulnerability Chain Exploited in the Wild
2026-04-10 NEW 2026CVE-2025-34291: Critical Account Takeover and RCE in LangflowCVE-2025-34291: Critical Account Takeover and RCE in Langflow
2026-04-10 NEW 202650,000+ WordPress Sites at Risk from Critical Ninja Forms RCE50,000+ WordPress Sites at Risk from Critical Ninja Forms RCE
2026-04-10 NEW 2026Critical Langflow RCE Flaw Exploited in the Wild Within HoursCritical Langflow RCE Flaw Exploited in the Wild Within Hours
2026-04-10 NEW 2026CVE-2026-20131: Analysis of Cisco FMC RCECVE-2026-20131: Analysis of Cisco FMC RCE
2026-04-10 NEW 2026n8n Critical Vulnerability (CVE-2026-21858): Unauthenticated RCEn8n Critical Vulnerability (CVE-2026-21858): Unauthenticated RCE
2026-04-10 NEW 2026Critical Telnetd Flaw (CVE-2026-32746) Enables Root RCECritical Telnetd Flaw (CVE-2026-32746) Enables Root RCE
2026-04-10 NEW 2026Critical vLLM RCE Allows Server Takeover via Malicious Video URL (CVE-2026-22778)Critical vLLM RCE Allows Server Takeover via Malicious Video URL (CVE-2026-22778)
2026-04-10 NEW 2026CVE-2026-27825: Critical Unauthenticated RCE and SSRF in mcp-atlassianCVE-2026-27825: Critical Unauthenticated RCE and SSRF in mcp-atlassian
2026-04-10 NEW 2026Unrestricted File Upload Leads to SSRF and RCEUnrestricted File Upload Leads to SSRF and RCE
2026-04-10 NEW 2026Complete Defense Against Node.js RCE: Real-World Exploit AnalysisComplete Defense Against Node.js RCE: Real-World Exploit Analysis
2026-04-10 NEW 2026Command Injection and RCE in MetaSpore (GHSL-2025-035 to 037)Command Injection and RCE in MetaSpore (GHSL-2025-035 to 037)
2026-04-10 NEW 2026Microsoft Bing Images OS Command Injection RCEMicrosoft Bing Images OS Command Injection RCE
2026-04-10 NEW 2026AWS RES Root RCE via Crafted Session Name (CVE-2026-5707)AWS RES Root RCE via Crafted Session Name (CVE-2026-5707)
2026-04-10 NEW 2026Command Injection RCE in Kubernetes Log Query on WindowsCommand Injection RCE in Kubernetes Log Query on Windows
2026-04-10 NEW 2026Prompt Injection to RCE in AI AgentsPrompt Injection to RCE in AI Agents
2026-04-10 NEW 2026Group-Office Critical RCE via Insecure Deserialization (CVE-2026-34838)Group-Office Critical RCE via Insecure Deserialization (CVE-2026-34838)
2026-04-10 NEW 2026NVIDIA APEX Deserialization RCE (CVE-2025-33244)NVIDIA APEX Deserialization RCE (CVE-2025-33244)
2026-04-10 NEW 2026React2Shell and RSC Vulnerabilities: Exploitation Threat BriefReact2Shell and RSC Vulnerabilities: Exploitation Threat Brief
2026-04-10 NEW 2026CVE-2025-55182: React Server Components RCE via Flight Payload DeserializationCVE-2025-55182: React Server Components RCE via Flight Payload Deserialization
2026-04-10 NEW 2026n8n CVE-2025-68613 RCE Exploitation: A Detailed Guiden8n CVE-2025-68613 RCE Exploitation: A Detailed Guide
2026-04-10 NEW 20262025 Zero-Days in Review: Lessons Learned2025 Zero-Days in Review: Lessons Learned
2026-04-10 NEW 2026Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)
2026-04-10 NEW 2026React2Shell: Critical Unauthenticated RCE in React Server ComponentsReact2Shell: Critical Unauthenticated RCE in React Server Components
2026-04-10 NEW 2026Defending Against React2Shell in React Server ComponentsDefending Against React2Shell in React Server Components
2026-04-10 NEW 2026Gogs Zero-Day RCE (CVE-2025-8110) Actively ExploitedGogs Zero-Day RCE (CVE-2025-8110) Actively Exploited
2026-04-10 NEW 2026SharePoint RCE: Exploitation, Detection, and MitigationSharePoint RCE: Exploitation, Detection, and Mitigation
2026-04-10 NEW 2026Apache ActiveMQ RCE via Jolokia API (CVE-2026-34197)Apache ActiveMQ RCE via Jolokia API (CVE-2026-34197)
2026-04-10 NEW 2026CVE-2026-34841: Bruno IDE RCE via Supply Chain AttackCVE-2026-34841: Bruno IDE RCE via Supply Chain Attack
2026-04-10 NEW 2026Telnet Vulnerability Opens Door to Remote Code Execution as RootTelnet Vulnerability Opens Door to Remote Code Execution as Root
2026-04-10 NEW 2026CVE-2026-23744: Remote Code Execution in MCPJam Inspector PoCCVE-2026-23744: Remote Code Execution in MCPJam Inspector PoC
2026-04-10 NEW 2026Remote Code Execution (RCE) 101Remote Code Execution (RCE) 101
2026-04-10 NEW 2026How I Got RCE in One of Bugcrowd's Public ProgramsHow I Got RCE in One of Bugcrowd's Public Programs
2026-04-10 NEW 2026From Recon to RCE: Hunting React2Shell (CVE-2025-55182)From Recon to RCE: Hunting React2Shell (CVE-2025-55182)
2026-04-10 NEW 2026RCE via Unclaimed Node Package: $2,500 Bug Bounty WriteupRCE via Unclaimed Node Package: $2,500 Bug Bounty Writeup
2026-04-10 NEW 2026Max Severity Flowise RCE Vulnerability Now Exploited in AttacksMax Severity Flowise RCE Vulnerability Now Exploited in Attacks
2026-04-10 NEW 2026CVE-2026-35056: XenForo RCE Vulnerability for Admin AccountsCVE-2026-35056: XenForo RCE Vulnerability for Admin Accounts
2026-04-10 NEW 2026CVE-2026-1731: Critical Unauthenticated RCE in BeyondTrust Remote SupportCVE-2026-1731: Critical Unauthenticated RCE in BeyondTrust Remote Support
2026-04-10 NEW 2026PraisonAI Critical RCE via Malicious YAML Parsing (CVE-2026-39890)PraisonAI Critical RCE via Malicious YAML Parsing (CVE-2026-39890)
2026-04-10 NEW 2026Critical n8n Flaws Allow Remote Code Execution and Credential ExposureCritical n8n Flaws Allow Remote Code Execution and Credential Exposure
2026-04-06 NEW 2026Metasploit Wrap-Up 04/03/2026Metasploit Wrap-Up 04/03/2026
2026-04-06 NEW 2026Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code ExecutionMultiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution
2026-04-06 NEW 2026Critical RCE Vulnerability in F5 BIG-IP Under ExploitationCritical RCE Vulnerability in F5 BIG-IP Under Exploitation
2026-04-06 NEW 2026CVE-2026-20131 Cisco FMC RCE VulnerabilityCVE-2026-20131 Cisco FMC RCE Vulnerability
2026-04-06 NEW 2026Emerging Threat: CVE-2026-27876 Grafana Remote Code Execution via SQL ExpressionsEmerging Threat: CVE-2026-27876 Grafana Remote Code Execution via SQL Expressions
2026-04-03 2026SSTI (Server-Side Template Injection) to RCE WalkthroughSSTI (Server-Side Template Injection) to RCE Walkthrough
2026-04-03 2026SSTI Leading to Remote Code Execution (RCE)SSTI Leading to Remote Code Execution (RCE)
2026-04-03 2026OpenOlat Velocity Template Injection Leads to RCEOpenOlat Velocity Template Injection Leads to RCE
2026-04-03 2026A Pentester's Guide to SSTI | CobaltA Pentester's Guide to SSTI | Cobalt
2026-04-03 2026RCE with Server-Side Template InjectionRCE with Server-Side Template Injection
2026-04-03 2026Rejetto HTTP File Server SSTI RCE (CVE-2024-23692) | InvictiRejetto HTTP File Server SSTI RCE (CVE-2024-23692) | Invicti
2026-04-03 2026WPML Plugin RCE via Twig SSTI (CVE-2024-6386)WPML Plugin RCE via Twig SSTI (CVE-2024-6386)
2026-04-03 2026PayloadsAllTheThings - Server Side Template InjectionPayloadsAllTheThings - Server Side Template Injection
2026-04-03 2026SSTI: Advanced Exploitation Guide | IntigritiSSTI: Advanced Exploitation Guide | Intigriti
2026-04-03 2026SSTI Exploitation with RCE Everywhere | YesWeHackSSTI Exploitation with RCE Everywhere | YesWeHack
2025-08-14 2025https://weekly.infosecwriteups.com/iw-weekly-39-10-000-bounty-zero-click-account-takeover-stored-xss-open-redirection-vulnerability-sql-injection-rce-reconnaissance-techniques-and-much-more/The content discusses various cybersecurity topics covered in IW Weekly 39, including a $10,000 bounty, zero-click account takeover, stored XSS, open redirection vulnerability, SQL injection, RCE, reconnaissance techniques, and more. It highlights the importance of understanding and addressing these vulnerabilities to enhance security measures.
2025-08-14 2025Chaining an Blind SSRF bug to Get an RCE | by Santosh Kumar Sha (@killmongaThe content discusses chaining a Blind Server-Side Request Forgery (SSRF) bug to achieve Remote Code Execution (RCE), presented by Santosh Kumar Sha. This technique involves exploiting a vulnerability in which an attacker can make a server perform unauthorized requests, leading to gaining control over the server and executing malicious code remotely. The focus is on demonstrating how an SSRF bug can be leveraged to escalate to a more severe RCE attack, highlighting the importance of understanding and securing against such vulnerabilities in web applications.
2025-08-14 2025Just Gopher It: Escalating a Blind SSRF to RCE for $15k — Yahoo Mail | by SThe content discusses escalating a blind Server-Side Request Forgery (SSRF) vulnerability to Remote Code Execution (RCE) in Yahoo Mail, earning a reward of $15,000. The process involves utilizing the Gopher protocol to exploit the SSRF vulnerability and achieve RCE. The article likely details the steps taken to identify, exploit, and report the vulnerability to Yahoo Mail's security team, resulting in a significant bounty payout.
2025-08-14 2025https://github.com/smgorelik/Windows-RCE-exploits/tree/master/Web/VBScriptThe provided link leads to a GitHub repository containing Windows Remote Code Execution (RCE) exploits written in VBScript. The repository offers a collection of scripts that can be used to exploit vulnerabilities in Windows systems. It focuses on utilizing VBScript for web-based attacks. The content provides a resource for security researchers and professionals interested in studying or testing RCE vulnerabilities in Windows environments using VBScript.
2025-08-14 2025https://medium.com/@logicbomb_1/bugbounty-how-i-was-able-to-bypass-firewall-to-get-rce-and-then-went-from-server-shell-to-get-783f71131b94?source=userActivityShare-90814179aa21-1525127127The content discusses a bug bounty experience where the author bypassed a firewall to achieve Remote Code Execution (RCE) and gained access to a server shell. The author describes the steps taken to exploit vulnerabilities, including identifying the firewall, exploiting it to gain RCE, and escalating privileges to access the server shell. The article provides insights into the process of identifying and exploiting security weaknesses, showcasing the author's skills in penetration testing and bug hunting.
2025-08-14 2025https://medium.com/@kedrisec/how-i-found-2-9-rce-at-yahoo-bug-bounty-program-20ab50dbfac7The content discusses a security researcher's experience finding a critical Remote Code Execution (RCE) vulnerability in Yahoo's Bug Bounty Program. The researcher details the steps taken to discover and exploit the vulnerability, which allowed unauthorized code execution on Yahoo's servers. The post highlights the importance of responsible disclosure and the collaboration between security researchers and companies to address such vulnerabilities. The discovery earned the researcher a significant bounty reward.
2025-08-14 2025https://medium.com/@p4c3n0g3/lfi-to-rce-via-access-log-injection-88684351e7c0?source=userActivityShare-90814179aa21-1524411790The content discusses a security vulnerability called Local File Inclusion (LFI) that can be exploited to achieve Remote Code Execution (RCE) through access log injection. By manipulating log files, an attacker can inject malicious code that gets executed on the server, leading to potential compromise. The article provides a detailed explanation of how this attack works and offers insights into the impact and mitigation strategies. It emphasizes the importance of understanding and securing against such vulnerabilities to protect systems from unauthorized access and data breaches.
2025-08-14 2025https://engineering.salesforce.com/meraki-rce-when-red-team-and-vulnerability-research-fell-in-love-3a119ce2cf56?source=userActivityShare-90814179aa21-1515163858The content discusses a case study where a red team and vulnerability researchers collaborated to discover a critical Remote Code Execution (RCE) vulnerability in Meraki devices. The article highlights the importance of teamwork, communication, and collaboration between different security roles to identify and address security flaws effectively. The process involved reverse engineering, code analysis, and exploitation techniques to uncover the vulnerability. The findings were responsibly disclosed to the vendor for remediation. This case emphasizes the significance of cross-functional cooperation in cybersecurity to enhance overall security posture and protect against potential threats.
2025-08-14 2025Taking note: XSS to RCE in the Simplenote Electron clientThe content discusses a security vulnerability in the Simplenote Electron client that allows attackers to exploit a cross-site scripting (XSS) issue to achieve remote code execution (RCE). This vulnerability poses a significant risk to users of the Simplenote application, potentially allowing malicious actors to execute arbitrary code on affected systems. It highlights the importance of promptly addressing security vulnerabilities in software applications to prevent exploitation and protect user data and systems.
2025-08-14 2025Leading the Blind to Light! - A Chain to RCEThe content titled "Leading the Blind to Light! - A Chain to RCE" suggests guiding individuals towards enlightenment or understanding, possibly related to a concept or process denoted by "RCE." The title implies a journey from darkness to illumination, symbolizing progress or insight.
2025-08-14 2025opsxcq/exploit-CVE-2016-10033: PHPMailer 5.2.18 Remote Code ExecutionThe content refers to an exploit named opsxcq/exploit-CVE-2016-10033 targeting PHPMailer version 5.2.18, allowing remote code execution. This vulnerability can potentially be exploited by attackers to execute malicious code on a target system.
2025-08-14 2025Artificial truth · From LFI to RCE in phpThe content discusses the progression from Local File Inclusion (LFI) to Remote Code Execution (RCE) vulnerabilities in PHP, highlighting the concept of "Artificial Truth." This likely delves into the exploitation of LFI vulnerabilities to escalate to RCE, emphasizing the importance of understanding and securing against such risks in PHP applications. The title suggests a focus on the evolution of security threats within PHP code, particularly the potential for LFI vulnerabilities to lead to more severe RCE exploits.
2025-08-14 2025http://brutelogic.com.br/blog/xss-and-rce/The content discusses Cross-Site Scripting (XSS) and Remote Code Execution (RCE) vulnerabilities. It explains how XSS can be used to inject malicious scripts into web applications, potentially leading to RCE attacks. The article emphasizes the importance of understanding these vulnerabilities to prevent security breaches. It provides examples and insights on how attackers exploit these vulnerabilities and offers recommendations on how to mitigate the risks associated with XSS and RCE. The content serves as a valuable resource for individuals seeking to enhance their knowledge of web security and protect against potential cyber threats.
2025-08-14 2025An Introduction to Visualforce - developer.force.comThe content is titled "An Introduction to Visualforce" on developer.force.com. It likely provides an overview or beginner's guide to Visualforce, a framework that allows developers to build custom user interfaces for Salesforce applications. Visualforce enables the creation of dynamic, interactive pages using a markup language similar to HTML. Developers can use Visualforce to customize the look and feel of their Salesforce applications, enhancing user experience and functionality. The content is likely aimed at developers looking to learn more about Visualforce and how to leverage it in their Salesforce development projects.
2025-08-14 2025The Tale Of SSRF To RCE on .GOV Domain | by Tobydavenn | Sep, 2022 | MediumThe content titled "The Tale Of SSRF To RCE on .GOV Domain" by Tobydavenn on Medium discusses a scenario involving Server-Side Request Forgery (SSRF) leading to Remote Code Execution (RCE) on a .GOV domain. The article likely delves into the technical details of how this vulnerability was exploited, highlighting the significance of such security flaws on government domains. It may provide insights into the exploitation process, potential impacts, and the importance of addressing SSRF vulnerabilities promptly to prevent RCE attacks.
2025-08-14 2025https://www.reddit.com/r/Hacking_Tutorials/comments/gtpkug/remote_code_execution_explained_with_real_life/?utm_source=share&utm_medium=ios_app&utm_name=iossmfThe content discusses remote code execution, explaining how it works with real-life examples. It delves into the concept of exploiting vulnerabilities to execute code on a remote system, potentially leading to unauthorized access. The post likely provides insights into the dangers of remote code execution and how hackers can leverage it for malicious purposes. It serves as a tutorial or informational resource for individuals interested in understanding cybersecurity threats and how to protect against them.
2025-08-14 2025https://medium.com/@smilehackerofficial/how-i-found-rce-but-got-duplicated-ea7b8b010990The content discusses a security researcher's experience finding a Remote Code Execution (RCE) vulnerability in a web application. The researcher details the steps taken to identify and exploit the vulnerability, leading to a successful demonstration of the RCE. However, the researcher later discovered that the same vulnerability had been previously reported by another researcher, resulting in a duplicate submission. The article highlights the importance of thorough research before reporting vulnerabilities to avoid duplication and emphasizes the need for collaboration within the security research community.
2025-08-14 2025https://link.medium.com/2gsvTU0Er0I'm sorry, but I'm unable to access external links or specific content. If you provide me with the main points or key ideas from the content, I'd be happy to help you summarize it in 100 words or less.
2025-08-14 2025https://omespino.com/write-up-private-bug-bounty-usd-rce-as-root-on-marathon-instance/The content discusses a detailed write-up of a successful bug bounty submission where the author discovered a critical vulnerability in a Marathon instance, allowing remote code execution as root. The author outlines the steps taken to identify and exploit the vulnerability, providing technical details and insights into the process. This write-up serves as a valuable resource for understanding the intricacies of bug hunting and the importance of security in software systems.
2025-08-14 2025https://link.medium.com/dAvgi0SsiZI'm sorry, but I can't access external links. If you provide the main points or key ideas from the content, I'd be happy to help summarize it for you in 100 words or less.
2025-08-14 2025https://link.medium.com/uOMoSgRU1YI'm sorry, but I am unable to access external content such as the Medium article you provided. If you could provide a brief summary or key points from the article, I would be happy to help you summarize it in 100 words or less.
2025-08-14 2025Zoom Zero Day: 4 Million Webcams & maybe an RCE? Just get them to visit yoThe content mentions a Zoom zero-day vulnerability affecting 4 million webcams that could potentially lead to remote code execution (RCE). The vulnerability can be exploited by tricking users into visiting a malicious website. This poses a significant security risk as attackers could gain unauthorized access to users' webcams and potentially execute malicious code on their devices. It highlights the importance of staying vigilant and updating software to protect against such vulnerabilities.
2025-08-14 2025elttam - Ruby 2.x Universal RCE Deserialization Gadget ChainThe content discusses "elttam," a Ruby 2.x Universal Remote Code Execution (RCE) Deserialization Gadget Chain. This vulnerability allows attackers to execute arbitrary code remotely by exploiting the deserialization process in Ruby 2.x. The term "gadget chain" refers to a sequence of code snippets that, when combined, can be used maliciously to achieve unauthorized access and control over a system. This issue highlights the importance of securing deserialization processes in Ruby 2.x to prevent such RCE attacks.
2025-08-14 2025http://blog.orange.tw/2018/08/how-i-chained-4-bugs-features-into-rce-on-amazon.htmlThe content discusses how a security researcher chained together four bugs and features to achieve Remote Code Execution (RCE) on Amazon. The researcher details the vulnerabilities found in Amazon's services and how they were exploited to gain unauthorized access and execute code remotely. The blog post provides a technical breakdown of the process, highlighting the importance of identifying and addressing security flaws to prevent such exploits.
2025-08-14 2025RCE by uploading a web.config ↳...The content discusses a Remote Code Execution (RCE) vulnerability that can be exploited by uploading a malicious web.config file. This type of vulnerability allows attackers to execute arbitrary code on a target system, potentially leading to unauthorized access or data breaches. It highlights the importance of securing file upload functionality and ensuring that user inputs are properly validated to prevent such security risks.
2021-01-20 2021Learn About Command Injection AttacksThe content discusses command injection attacks where attackers can run their code on a victim's machine. This type of attack allows malicious actors to execute arbitrary commands on a system, potentially leading to unauthorized access, data theft, or system compromise. It is crucial to understand and protect against command injection vulnerabilities to prevent security breaches and safeguard sensitive information.
2020-05-31 2020r/Hacking_Tutorials - Remote Code Execution explained with real life bug bounty reportsThe Reddit post titled "r/Hacking_Tutorials - Remote Code Execution explained with real life bug bounty reports" has received 36 votes but no comments yet. The post likely discusses remote code execution vulnerabilities using real-life bug bounty reports. It aims to provide tutorials and insights into how these vulnerabilities can be exploited, potentially offering valuable information for those interested in hacking and cybersecurity.
2019-10-05 2019SQL injection to RCEThe content discusses a case of SQL injection leading to Remote Code Execution (RCE) discovered during a recent customer penetration testing. It hints at the potential security vulnerability and the impact it had on the system.
2019-08-28 2019WRITE UP – Private bug bounty $$,$$$ USD: “RCE as root on Marathon-Mesos instance” – @omespinoThe content is a write-up about a private bug bounty offering a significant monetary reward for discovering a remote code execution (RCE) vulnerability that allows gaining root access on a Marathon-Mesos instance. The write-up is authored by @omespino. The focus is on detailing the exploit and the potential impact of the vulnerability.
2019-04-20 2019PDFReacter SSRF to ROOT Level Local File Read which led to RCEPDFReacter is a parser that converts HTML content to PDF.
2018-11-09 2018elttam - Ruby 2.x Universal RCE Deserialization Gadget Chain"elttam is a security company offering research-based security assessment services, prioritizing practicality and technical expertise to assist clients in safeguarding critical assets."
2018-07-06 2018Latex to RCE, Private Bug Bounty ProgramThe content discusses the author's participation in a private bug bounty program focused on a CMS journal site, approximately a year ago. The author aims to share their learnings from this experience, particularly related to exploiting a vulnerability in Latex to achieve Remote Code Execution (RCE). The bug bounty program provided an opportunity for the author to enhance their skills in identifying and exploiting security flaws.
2018-06-07 2018How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!The content appears to be a title mentioning chaining four vulnerabilities on GitHub Enterprise, from SSRF execution to RCE. The author is identified as 🍊.
2018-06-04 2018XSS and RCE - Brute XSSRCE (Remote Code Execution) is a severe vulnerability sought after by attackers to compromise systems. XSS, often overlooked, can be a stepping stone towards achieving RCE. While XSS may not seem as critical, it can lead to significant security breaches if left unaddressed. Understanding the relationship between XSS and RCE is crucial for comprehensive security measures.
2018-04-29 2018#BugBounty — How I was able to bypass firewall to get RCE and then went from server shell to get…The content is about a bug bounty experience where the author bypassed a firewall to achieve Remote Code Execution (RCE) and gained access to a server shell. The author likely shares details of the process and techniques used in this security testing scenario.
2017-11-30 2017Taking note: XSS to RCE in the Simplenote Electron clientThe content discusses a security vulnerability in the Simplenote Electron client that allows for cross-site scripting (XSS) attacks to escalate to remote code execution (RCE). This vulnerability poses a significant risk to users of the Simplenote application.
2017-11-19 2017Leading the Blind to Light! - A Chain to RCEThe content discusses the process of chaining multiple bugs together to achieve remote code execution (RCE) through diligent work and reconnaissance. By identifying and exploiting vulnerabilities in a sequential manner, attackers can gain control over a system.

Frequently Asked Questions

What is remote code execution?
Remote Code Execution (RCE) is a vulnerability that allows an attacker to run arbitrary commands or code on a target system. It is the most critical class of security vulnerability because it gives the attacker the same level of access as the application or server process, often leading to complete system compromise.
What are common RCE attack vectors?
Common vectors include command injection (unsanitized input passed to shell commands), unsafe deserialization (Java, PHP, Python, .NET), Server-Side Template Injection (Jinja2, Twig, Freemarker), file upload bypasses that execute uploaded code, expression language injection in Java frameworks, and prototype pollution in Node.js leading to code execution.
Why does RCE pay the highest bug bounties?
RCE represents total system compromise — an attacker can read all data, modify the application, pivot to internal networks, and potentially access cloud infrastructure. The impact is maximum, so bounty programs consistently pay their highest rewards for RCE findings, often ranging from $10,000 to $100,000+ depending on the target.

Weekly AppSec Digest

Get new resources delivered every Monday.