CVE-2023-0599
- EPSS 0.79%
- Veröffentlicht 01.02.2023 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:37:27
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and scri...
CVE-2020-7385
- EPSS 0.58%
- Veröffentlicht 23.04.2021 16:15:08
- Zuletzt bearbeitet 21.11.2024 05:37:08
By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions....
CVE-2020-7384
- EPSS 70.09%
- Veröffentlicht 29.10.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:37:08
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
CVE-2019-5645
- EPSS 87.88%
- Veröffentlicht 01.09.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:45:17
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being es...
CVE-2020-7377
- EPSS 0.41%
- Veröffentlicht 24.08.2020 19:15:10
- Zuletzt bearbeitet 21.11.2024 05:37:08
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file ...
- EPSS 0.33%
- Veröffentlicht 24.08.2020 19:15:10
- Zuletzt bearbeitet 21.11.2024 05:37:07
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when th...
CVE-2020-7355
- EPSS 0.43%
- Veröffentlicht 25.06.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:37:06
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which ...
CVE-2020-7354
- EPSS 0.43%
- Veröffentlicht 25.06.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:37:06
Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, whic...
CVE-2020-7350
- EPSS 58.67%
- Veröffentlicht 22.04.2020 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:37:05
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a ...
CVE-2019-5642
- EPSS 0.1%
- Veröffentlicht 06.11.2019 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:45:17
Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same sys...