Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: JBoss Application Server Remote Exploit
From: Jari Fredriksson <jarif () iki fi>
Date: Mon, 07 Mar 2011 17:00:19 +0200

On 4.3.2011 14:49, HI-TECH . wrote:
This is a perl port of the metasploit module by Patrick Hof (redteam-pentesting)

# Exploit Title: JBoss Application Server Remote Exploit
# Date: March 2011
# Author: Kingcope
# Version: 4.* 5.*
# Tested on: Linux / Windows
# CVE : CVE-2010-0738

This email was sent from an internet cafe :>


No joy with that, if jmx-console is removed all together or otherwise
disabled?

-- 

There is a 20% chance of tomorrow.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault