This Metasploit module uploads an executable file to the victim system, creates a share containing that executable, creates a remote service on each target system using a UNC path to that file, and finally starts the service(s). The result is similar to psexec but with the added benefit of using the session's current authentication token instead of having to know a password or hash.
0bbd2a9a13a6e081275470dda5d8d388
BASE, the Basic Analysis and Security Engine, suffers from persistent and reflective cross site scripting vulnerabilities.
203c1c096b58954a61d4cfec2c98f99c