Squash YAML Code Execution

M33

[ Verified Seller ]
Staff member
Trusted Seller
Joined
11 yrs. 8 mth. 24 days
Messages
5,010
Reaction score
11,818
Wallet
13,191$
This Metasploit module exploits a remote code execution vulnerability in the YAML request processor of the Squash application

Author : Charlie Eriksen

Source :
Please, Log in or Register to view URLs content!


Code :
Code:
Please, Log in or Register to view codes content!
 
Paid adv. expire in 2 months
CLICK to buy Advertisement !
westernunion carding Verified & Trusted WesternUnion | MoneyGram | Bank - Transferring [299$ BTC for 2000$ WU]
electronics carding Verified & Trusted Electronics Carding, Carding iPhone, Samsung Carding, MacBook Carding, Laptops Carding
Top Bottom