Browsing the "read" Tag

Simple JobBoard Authenticated File Read ≈ Packet Storm

January 21st, 2021 📆 | 5048 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Auxiliaryinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::Wordpressinclude Msf::Auxiliary::Scanner def initialize(info = {})super(update_info(info,‘Name’

Tagged with:




WordPress Plugin Simple Job Board 2.9.3 – Authenticated File Read (Metasploit)

January 21st, 2021 📆 | 5696 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HTTP::Wordpress

Tagged with:




Apache Flink 1.11.0 Arbitrary File Read / Directory Traversal ≈ Packet Storm

January 9th, 2021 📆 | 6284 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Auxiliaryinclude Msf::Exploit::Remote::HttpClientinclude Msf::Auxiliary::Scannerinclude Msf::Auxiliary::Report def initialize(info = {})super(update_info(info,‘Name’

Tagged with:




Apache Flink 1.11.0 – Unauthenticated Arbitrary File Read (Metasploit)

January 8th, 2021 📆 | 4685 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner

Tagged with:




[Read] Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers For

January 6th, 2021 📆 | 2532 Views ⚑

https://goodideas22.blogspot.com/?book=0525564632“Immensely readable…A hair-raising, cautionary tale about the burgeoning, post-Stuxnet world of state-sponsored hackers.” –Washington PostFrom Wired senior writer Andy Greenberg

Tagged with:




WordPress W3 Total Cache 0.9.3 File Read / Directory Traversal ≈ Packet Storm

December 23rd, 2020 📆 | 2461 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework### class MetasploitModule < Msf::Auxiliaryinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::Wordpressinclude Msf::Auxiliary::Scanner def initialize(info = {})super(update_info(info,‘Name’

Tagged with:




WordPress Plugin W3 Total Cache – Unauthenticated Arbitrary File Read (Metasploit)

December 22nd, 2020 📆 | 7331 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include

Tagged with:




WordPress Plugin Duplicator 1.3.26 – Unauthenticated Arbitrary File Read (Metasploit)

December 19th, 2020 📆 | 3697 Views ⚑

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HTTP::Wordpress

Tagged with:




WordPress Duplicator 1.3.26 Directory Traversal / File Read ≈ Packet Storm

December 19th, 2020 📆 | 4028 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliaryinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::Wordpressinclude Msf::Auxiliary::Scannerdef initialize(info = {})super(update_info(info,'Name' => 'WordPress

Tagged with:




GitLab File Read Remote Code Execution ≈ Packet Storm

December 10th, 2020 📆 | 5093 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck # From

Tagged with: