Subscribe via feed.

Oracle GlassFish Server 4.1 Directory Traversal

Posted by deepcore on August 14, 2018 – 4:19 am

This Metasploit module exploits an unauthenticated directory traversal vulnerability which exits in administration console of Oracle GlassFish Server version 4.1, which is listening by default on port 4848/TCP.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.