Full Disclosure mailing list archives
Re: JBoss Application Server Remote Exploit
From: Jari Fredriksson <jarif () iki fi>
Date: Mon, 07 Mar 2011 17:00:19 +0200
On 4.3.2011 14:49, HI-TECH . wrote:
This is a perl port of the metasploit module by Patrick Hof (redteam-pentesting) # Exploit Title: JBoss Application Server Remote Exploit # Date: March 2011 # Author: Kingcope # Version: 4.* 5.* # Tested on: Linux / Windows # CVE : CVE-2010-0738 This email was sent from an internet cafe :>
No joy with that, if jmx-console is removed all together or otherwise disabled? -- There is a 20% chance of tomorrow.
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- JBoss Application Server Remote Exploit HI-TECH . (Mar 04)
- Re: JBoss Application Server Remote Exploit Jari Fredriksson (Mar 07)
- Insect Pro 2.1 : New version release Juan Sacco (Mar 08)
- Re: Insect Pro 2.1 : New version release Quentin Ducas (Mar 08)
- Re: Insect Pro 2.1 : New version release Mario Vilas (Mar 08)
- Re: Insect Pro 2.1 : New version release Steve Pinkham (Mar 12)
- Insect Pro 2.1 : New version release Juan Sacco (Mar 08)
- Re: Insect Pro 2.1 : New version release Hyperion Hyp (Mar 08)
- Re: Insect Pro 2.1 : New version release Cal Leeming (Mar 09)
- Re: Insect Pro 2.1 : New version release Hyperion Hyp (Mar 10)
- Re: Insect Pro 2.1 : New version release Cal Leeming (Mar 10)
- Re: Insect Pro 2.1 : New version release huj huj huj (Mar 10)
- Re: JBoss Application Server Remote Exploit Jari Fredriksson (Mar 07)