
Brendan Coles
Articles
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Jay Turla
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::Tcp include Msf::Auxiliary::Report include Msf::Auxiliary::Scannerdef initialize(info = {}) super(update_info(info, 'Name' => 'EasyCafe Server Remote File Access', 'Description' => %q{ This module exploits a file retrieval vulnerability in EasyCafe Server.
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Hoa Nguyen |Hoa Nguyễn |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report def initialize(info = {}) super( update_info( info, 'Name' => 'Apache Flink JobManager Traversal', 'Description' => %q{ This module exploits an unauthenticated directory traversal vulnerability in Apache Flink...
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Pedro Santos Ribeiro |'Use SSL'
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info( info, 'Name' => 'ManageEngine DeviceExpert User Credentials', 'Description' => %q{ This module extracts usernames and salted MD5 password hashes from ManageEngine...
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner HttpFingerprint = { pattern: [ /DManager/ ] } def initialize(info = {}) super( update_info( info, 'Name' => 'SurgeNews User Credentials', 'Description' => %q{ This module exploits a vulnerability in the WebNews web...
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner def initialize(info = {}) super(update_info(info, 'Name' => 'ThinVNC Directory Traversal', 'Description' => %q{ This module exploits a directory traversal vulnerability in ThinVNC versions 1.0b1 and prior which...
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →