Browsing the "deserialization" Tag

SharePoint DataSet / DataTable Deserialization ≈ Packet Storm

August 1st, 2020 📆 | 3033 Views ⚑

# This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::Powershellprepend

Tagged with:




Plesk / myLittleAdmin ViewState .NET Deserialization ≈ Packet Storm

May 22nd, 2020 📆 | 4861 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking # VIEWSTATE_GENERATOR = ‘CA0B0334’.freeze

Tagged with:




WebLogic Server Deserialization Remote Code Execution ≈ Packet Storm

May 21st, 2020 📆 | 4166 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = NormalRanking include Msf::Exploit::Remote::Tcpinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::Powershellinclude Msf::Exploit::Remote::AutoCheck

Tagged with:




Protection Licensing Toolkit ReadyAPI 3.2.5 Code Execution / Deserialization ≈ Packet Storm

May 20th, 2020 📆 | 6406 Views ⚑

Advisory ID: SYSS-2019-039Product: Protection Licensing Toolkit, SoapUI/LoadUI/ServiceV ProManufacturer: jProductivity LLC, SmartBear SoftwareAffected Version(s): – ReadyAPI 3.2.5Tested Version(s): ReadyAPI 3.2.5Vulnerability Type:

Tagged with:




Veeam ONE Agent .NET Deserialization ↭

May 5th, 2020 📆 | 3225 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcpinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::Powershell

Tagged with:




Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution ↭

April 24th, 2020 📆 | 2772 Views ⚑

*]#!/usr/bin/env python3*]# -*- coding: utf-8 -*-*]#*]#*]# Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution*]#*]#*]# Vendor: Furukawa Electric Co., Ltd.

Tagged with:




DotNetNuke – Cookie Deserialization Remote Code Execution (Metasploit)

April 16th, 2020 📆 | 6713 Views ⚑

*] *]## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' require 'openssl' require 'set' class

Tagged with:




DotNetNuke Cookie Deserialization Remote Code Execution ↭

April 3rd, 2020 📆 | 4738 Views ⚑

*]##*]# This module requires Metasploit: https://metasploit.com/download*]# Current source: https://github.com/rapid7/metasploit-framework*]## require ‘msf/core/exploit/powershell'*]require ‘openssl'*]require ‘set’ class MetasploitModule < Msf::Exploit::Remote*]include Msf::Exploit::Remote::HttpClient*]include Msf::Exploit::Powershell*]include Msf::Exploit::Remote::HttpServer

Tagged with:




ManageEngine Desktop Central Java Deserialization ↭

March 14th, 2020 📆 | 3289 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::CmdStagerinclude

Tagged with:




SQL Server Reporting Services (SSRS) ViewState Deserialization ≈ ↲

March 13th, 2020 📆 | 4896 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def initialize(info

Tagged with:




ManageEngine Desktop Central Deserialization / Remote Code Execution ≈ ↲

March 9th, 2020 📆 | 2183 Views ⚑

#!/usr/bin/python3“””ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability Download: https://www.manageengine.com/products/desktop-central/download-free.htmlFile …: ManageEngine_DesktopCentral_64bit.exeSHA1 …: 73ab5bb00f993685c711c0aed450444795d5b826Found by:

Tagged with:




ManageEngine Desktop Central – ‘FileStorage getChartImage’ Deserialization / Unauthenticated Remote Code Execution

March 6th, 2020 📆 | 4779 Views ⚑

#!/usr/bin/python3 """ ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability Download: https://www.manageengine.com/products/desktop-central/download-free.html File ...: ManageEngine_DesktopCentral_64bit.exe

Tagged with:




Exchange Control Panel Viewstate Deserialization ≈ ↲

March 4th, 2020 📆 | 7828 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘bindata’ class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking # include Msf::Auxiliary::Reportinclude

Tagged with:




(0Day) Rockwell Automation FactoryTalk RNADiagnosticsSrv Deserialization Of Untrusted Data Remote Code Execution Vulnerability

February 20th, 2020 📆 | 6862 Views ⚑

CVE ID CVSS SCORE 9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) AFFECTED VENDORS Rockwell Automation AFFECTED PRODUCTS FactoryTalk Diagnostics VULNERABILITY DETAILS This vulnerability allows remote

Tagged with: