This Metasploit module exploits an unauthenticated directory traversal vulnerability which exits in administration console of Oracle GlassFish Server version 4.1, which is listening by default on port 4848/TCP.
Cloudme 1.9 – Buffer Overflow (DEP) (Metasploit)
Tags:
0day,
remote exploit
Wansview 1.0.2 – Denial of Service (PoC)
Tags:
0day,
remote exploit
Oracle GlassFish Server Open Source Edition 4.1 – Path Traversal (Metasploit)
Tags:
0day,
remote exploit
cgit 1.2.1 – Directory Traversal (Metasploit)
Tags:
0day,
remote exploit
http://eoffice.doae.go.th/MD15.php notified by MD15
Tags:
defacement
Android – Directory Traversal over USB via Injection in blkid Output
Tags:
0day,
remote exploit
IBM Sterling B2B Integrator 5.2.0.1/5.2.6.3 – Cross-Site Scripting
Tags:
0day,
remote exploit
IP Finder 1.5 – Denial of Service (PoC)
Tags:
0day,
remote exploit
Linux/x64 – Add Root User (toor/toor) Shellcode (99 bytes)
Tags:
0day,
remote exploit