Browsing the "code" Tag

INNEO Startup TOOLS 2018 M040 13.0.70.3804 Remote Code Execution ≈ Packet Storm

July 30th, 2020 📆 | 2382 Views ⚑

*]# Exploit Title: INNEO Startup TOOLS 2018 M040 13.0.70.3804 – Remote Code Execution*]# Date: 2020-07-23*]# Exploit Author: Patrick Hener, SySS

Tagged with:




ZenTao Pro 8.8.2 Remote Code Execution ≈ Packet Storm

July 23rd, 2020 📆 | 4877 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankinginclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerprepend Msf::Exploit::Remote::AutoCheck def initialize(info

Tagged with:




Mida Solutions eFramework 2.9.0 XSS / Code Execution / SQL Injection ≈ Packet Storm

July 22nd, 2020 📆 | 1745 Views ⚑

=============================================Title: Mida Solutions eFramework Multiple VulnerabilitiesDate: 19/07/2020Author: Andrea BaessoReference: https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.htmlVendor Homepage: https://www.midasolutions.com/Software Link: ova-efw.midasolutions.comSoftware: Mida eFrameworkVersions: < =2.9.0Tested on: 2.8.9,

Tagged with:




Plex Unpickle Dict Windows Remote Code Execution ≈ Packet Storm

July 18th, 2020 📆 | 5570 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = NormalRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::FileDropper def initialize(info

Tagged with:




Trend Micro Web Security Virtual Appliance 6.5 SP2 Patch 4 Build 1901 – Remote Code Execution (Metasploit)

July 16th, 2020 📆 | 6766 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include

Tagged with:




Trend Micro Web Security Remote Code Execution ≈ Packet Storm

July 15th, 2020 📆 | 1997 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info =

Tagged with: