
'Use SSL'
Articles
-
Sep 1, 2024 |
packetstormsecurity.com | Brendan Coles |Pedro Santos Ribeiro |'Use SSL'
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info( info, 'Name' => 'ManageEngine DeviceExpert User Credentials', 'Description' => %q{ This module extracts usernames and salted MD5 password hashes from ManageEngine...
-
Sep 1, 2024 |
packetstormsecurity.com | Jay Turla |'Use SSL'
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scannerdef initialize(info = {}) super(update_info(info, 'Name' => "Accellion FTA 'statecode' Cookie Arbitrary File Read", 'Description' => %q{ This module exploits a file disclosure vulnerability in the Accellion File Transfer appliance.
-
Sep 1, 2024 |
packetstormsecurity.com | 'Use SSL' |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'ManageEngine DeviceExpert 5.6 ScheduleResultViewer FileName Traversal', 'Description' => %q{ This module exploits a directory traversal vulnerability...
-
Aug 31, 2024 |
packetstormsecurity.com | Pedro Santos Ribeiro |'Use SSL' |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report def initialize(info = {}) super( update_info( info, 'Name' => 'ManageEngine Password Manager SQLAdvancedALSearchResult.cc Pro SQL Injection', 'Description' => %q{ ManageEngine Password Manager Pro (PMP) has an authenticated blind SQL injection...
-
Aug 31, 2024 |
packetstormsecurity.com | Brandon Perry |'Use SSL' |Jay Turla
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'EMC CTA v10.0 Unauthenticated XXE Arbitrary File Read', 'Description' => %q{ EMC CTA v10.0 is susceptible to an unauthenticated XXE attack that allows an attacker to read arbitrary files from the file system with the...
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →