bug-bounty512
xss297
google214
rce180
microsoft174
facebook161
exploit143
account-takeover118
bragging-post117
malware112
cve102
apple102
privilege-escalation92
csrf88
authentication-bypass79
stored-xss75
open-source68
phishing67
writeup67
reflected-xss63
access-control62
web-security60
ai-agents59
ssrf55
browser53
input-validation52
dos50
reverse-engineering49
defi48
smart-contract48
cross-site-scripting48
sql-injection46
ethereum45
cloudflare43
lfi41
information-disclosure40
supply-chain39
api-security39
oauth39
react38
web337
race-condition37
web-application37
burp-suite36
tool35
ctf35
idor33
smart-contract-vulnerability33
pentest33
html-injection33
0
6/10
CVE-2017-5244 is a CSRF vulnerability in Metasploit Express, Community, and Pro editions (versions < 4.14.0) that allows attackers to stop all running tasks by tricking authenticated users into loading a malicious page, due to improper validation of anti-CSRF tokens and the use of GET requests for state-changing operations. The vulnerability was patched by enforcing POST-only requests with CSRF token validation.
csrf
cross-site-request-forgery
metasploit
web-application
cve-2017-5244
anti-csrf-bypass
get-request-misuse
proof-of-concept
vulnerability-disclosure
CVE-2017-5244
Metasploit
Rapid7
Mohamed A. Baset
Seekurity
Samuel Huckins