Browsing the "metasploit" Tag

Synology DiskStation Manager – smart.cgi Remote Command Execution (Metasploit)

May 25th, 2020 📆 | 4173 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include

Tagged with:







Unraid 6.8.0 – Auth Bypass PHP Code Execution (Metasploit)

April 29th, 2020 📆 | 2548 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::Exploit::PhpEXE

Tagged with:




Injection Channel Update (04-28-2020) – Udemy, LLC, Patreon, and Questions for the Audience!

April 29th, 2020 📆 | 5486 Views ⚑

This is a channel update video where we cover the state of Injection, the new Udemy course, and other topics

Tagged with:




Metasploit Libnotify Arbitrary Command Execution ↭

April 17th, 2020 📆 | 3400 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::FILEFORMAT def initialize(info =

Tagged with:




TP-Link Archer A7/C7 – Unauthenticated LAN Remote Code Execution (Metasploit)

April 16th, 2020 📆 | 2129 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'openssl' class MetasploitModule < Msf::Exploit::Remote Rank =

Tagged with:




PlaySMS – index.php Unauthenticated Template Injection Code Execution (Metasploit)

April 16th, 2020 📆 | 1564 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include

Tagged with:




DotNetNuke – Cookie Deserialization Remote Code Execution (Metasploit)

April 16th, 2020 📆 | 2575 Views ⚑

*] *]## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' require 'openssl' require 'set' class

Tagged with: