Blog
![../assets/images/featured/whatsup-wcf-01.jpg](https://summoning.team/../assets/images/featured/whatsup-wcf-01_hub12d7ebfbb1a3bfc0035db9b2e9fa8af_696839_500x0_resize_q90_h2_box.webp)
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive
I discovered an unauthenticated path traversal against the latest version of progress whatsup gold and turned it into a pre-auth RCE, following is how I did it, this is the story of CVE-2024-4885
![../assets/images/featured/whatsup-wcf-02.jpg](https://summoning.team/../assets/images/featured/whatsup-wcf-02_hu3cadecde003a9aae7a4a47ca68232465_688576_500x0_resize_q90_h2_box.webp)
WhatsUp Gold Pre-Auth RCE WriteDataFile Primitive
Using a path traversal vulnerability to achieve remote code execution, this is the story of CVE-2024-4883 a pre-auth RCE against progress whatsup gold
![../assets/images/featured/whatsup-CVE-2024-5009.jpg](https://summoning.team/../assets/images/featured/whatsup-CVE-2024-5009_hu787f3ea410a3dcd79fc181c33eccf53f_1801610_500x0_resize_q90_h2_box.webp)
WhatsUp Gold SetAdminPassword Privilege Escalation
Lets analyze a privilege escalation which I found targeting progress whatsup gold, this is the story of CVE-2024-5009
![../assets/images/featured/veeam-vro-CVE-2024-29855.jpg](https://summoning.team/../assets/images/featured/veeam-vro-CVE-2024-29855_hu84d060dc1010708d079f6cc52b7b47e9_583203_500x0_resize_q90_h2_box.webp)
There are no Secrets || Exploiting Veeam CVE-2024-29855
CVE-2024-29855
![../assets/images/featured/veeam-epm-CVE-2024-29849.jpg](https://summoning.team/../assets/images/featured/veeam-epm-CVE-2024-29849_hu9348ca991627b451f868374b7ab30b92_683945_500x0_resize_q90_h2_box.webp)
Bypassing Veeam Authentication CVE-2024-29849
CVE-2024-29849
![../assets/images/featured/vrni-cover.png](https://summoning.team/../assets/images/featured/vrni-cover_hueaf9490faefd9db74a3ea3bcedd8186f_120862_500x0_resize_q90_h2_box_3.webp)
VMWare Aria Operations for Networks Static SSH key RCE
CVE-2023-34039
![../assets/images/featured/vrni.png](https://summoning.team/../assets/images/featured/vrni_hue09944fd17a1843c1857dac887c1c940_292538_500x0_resize_q90_h2_box_3.webp)
Pre-authenticated RCE in VMware vRealize Network Insight
CVE-2023-20887
![../assets/images/featured/vmware-nsx-exploited.png](https://summoning.team/../assets/images/featured/vmware-nsx-exploited_huf7bc5d54fbd06200a1bf33a920ba612f_199982_500x0_resize_q90_h2_box_3.webp)
Pre-authenticated Remote Code Execution in VMWare NSX Manager
CVE-2021-39144, CVE-2022-31678
![../assets/images/featured/veeam-exploit.png](https://summoning.team/../assets/images/featured/veeam-exploit_hu0fc2206a761018221be086e993577529_365931_500x0_resize_q90_h2_box_3.webp)
Veeam Unauthenticated Remote Code Execution
CVE-2022-26503,CVE-2022-26504,CVE-2022-26500,CVE-2022-26501