[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection
ATT&CK techniques detected
T1059.004Unix Shell
98%
“) except exception as e : print ( " [ - ] execution failed : ", str ( e ) ) print ( " \ n " + " - " * 70 + " \ n " ) # ──────────────────────────────────────────────────────────────── # poc 3 : dangerous example – reverse shell # ──────────────────────────────────────────────────…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.006Python
36%
“[ webapps ] cybersecurity ai ( cai ) framework 0. 5. 10 - command injection # exploit title : cybersecurity ai ( cai ) framework 0. 5. 10 - command injection # cve : cve - 2026 - 25130 # date : 2026 - 02 - 03 # exploit author : mohammed idrees banyamer # author country : jordan #…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.006Python
32%
“local execution ) # observe command output or side effects ( e. g. whoami result, created files, etc. ) from cai. tools. reconnaissance. filesystem import find _ file import sys def main ( ) : print ( " = = = cve - 2026 - 25130 poc - find _ file argument injection / os command in…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection