Metasploit Module's profile photo

Metasploit Module

Articles

  • Sep 1, 2024 | packetstormsecurity.com | Metasploit Module |Will Caput |Trevor Hartman |Thaddeus Bogner

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner def initialize super( 'Name' => 'Atlassian Crowd XML Entity Expansion Remote File Access', 'Description' => %q{ This module simply attempts to read a remote file from the server using a vulnerability in the way...

  • Sep 1, 2024 | packetstormsecurity.com | Metasploit Module |Jay Turla

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner def initialize(info = {}) super(update_info(info, 'Name' => 'A10 Networks AX Loadbalancer Directory Traversal', 'Description' => %q{ This module exploits a directory traversal flaw found in A10 Networks (Soft) AX...

  • Aug 31, 2024 | packetstormsecurity.com | Bojan Zdrnja |Brandon Perry |Metasploit Module |Drazen Popovic

    ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'nexpose'class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Reportdef initialize(info = {}) super( update_info( info, 'Name' => 'Nexpose XXE Arbitrary File Read', 'Description' => %q{ Nexpose v5.7.2 and prior is vulnerable to a XML External Entity attack via a number of vectors.

  • Aug 31, 2024 | packetstormsecurity.com | Metasploit Module |Jay Turla |Pedro A. Ribeiro

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HTTP::Wordpress def initialize(info = {}) super( update_info( info, 'Name' => 'WordPress WP EasyCart Plugin Privilege Escalation', 'Description' => %q{ The WordPress WP EasyCart plugin from version 1.1.30 to 3.0.20 allows authenticated users of any user level to set any system option via...

  • Aug 31, 2024 | packetstormsecurity.com | Jan Rude |Metasploit Module |Jay Turla

    ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClientdef initialize(info = {}) super( update_info( info, 'Name' => 'Telpho10 Backup Credentials Dumper', 'Description' => %q{ This module exploits a vulnerability present in all versions of Telpho10 telephone system appliance.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →