'Use SSL''s profile photo

'Use SSL'

Articles

  • Sep 1, 2024 | packetstormsecurity.com | Brendan Coles |Pedro Santos Ribeiro |'Use SSL'

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info( info, 'Name' => 'ManageEngine DeviceExpert User Credentials', 'Description' => %q{ This module extracts usernames and salted MD5 password hashes from ManageEngine...

  • Sep 1, 2024 | packetstormsecurity.com | Jay Turla |'Use SSL'

    ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scannerdef initialize(info = {}) super(update_info(info, 'Name' => "Accellion FTA 'statecode' Cookie Arbitrary File Read", 'Description' => %q{ This module exploits a file disclosure vulnerability in the Accellion File Transfer appliance.

  • Sep 1, 2024 | packetstormsecurity.com | 'Use SSL' |Jay Turla

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'ManageEngine DeviceExpert 5.6 ScheduleResultViewer FileName Traversal', 'Description' => %q{ This module exploits a directory traversal vulnerability...

  • Aug 31, 2024 | packetstormsecurity.com | Pedro Santos Ribeiro |'Use SSL' |Jay Turla

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report def initialize(info = {}) super( update_info( info, 'Name' => 'ManageEngine Password Manager SQLAdvancedALSearchResult.cc Pro SQL Injection', 'Description' => %q{ ManageEngine Password Manager Pro (PMP) has an authenticated blind SQL injection...

  • Aug 31, 2024 | packetstormsecurity.com | Brandon Perry |'Use SSL' |Jay Turla

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'EMC CTA v10.0 Unauthenticated XXE Arbitrary File Read', 'Description' => %q{ EMC CTA v10.0 is susceptible to an unauthenticated XXE attack that allows an attacker to read arbitrary files from the file system with the...

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →