Oracle GlassFish Server 4.1 Directory Traversal
Posted by deepcore on August 14, 2018 – 4:19 am
This Metasploit module exploits an unauthenticated directory traversal vulnerability which exits in administration console of Oracle GlassFish Server version 4.1, which is listening by default on port 4848/TCP.
Post a reply
You must be logged in to post a comment.