This Metasploit module exploits an unauthenticated directory traversal vulnerability which exits in administration console of Oracle GlassFish Server version 4.1, which is listening by default on port 4848/TCP.
>> ARCHIVE: 2018-08
Cloudme 1.9 – Buffer Overflow (DEP) (Metasploit)
Wansview 1.0.2 – Denial of Service (PoC)
Oracle GlassFish Server Open Source Edition 4.1 – Path Traversal (Metasploit)
cgit 1.2.1 – Directory Traversal (Metasploit)
http://eoffice.doae.go.th/MD15.php notified by MD15
Android – Directory Traversal over USB via Injection in blkid Output
IBM Sterling B2B Integrator 5.2.0.1/5.2.6.3 – Cross-Site Scripting
IP Finder 1.5 – Denial of Service (PoC)
Linux/x64 – Add Root User (toor/toor) Shellcode (99 bytes)