This Metasploit module enumerates databases on CouchDB using the REST API (without authentication by default).
2942d69e8cd376e67d7cb3531714d06e9b22d6dd3d9fe3f3f432e8930a09dad3
This Metasploit module can be used to leverage the extension functionality added since Redis 4.0.0 to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis which called replication between master and slave.
2714070c8deee280f0dce194081f510869dec8b4d01b5127d461fe882cd026f7
This Metasploit module can be used to leverage the extension functionality added by Redis 4.x and 5.x to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis which called replication between master and slave.
8a25e4a7af0bb0c47237e268c64439b1ccedef5a35d240b4946e5ec04d9df945
This Module will generate and upload an executable to a remote host and then makes it a persistent service. It will create a new service which will start the payload whenever the service is running. Admin or system privilege is required.
59ee52699ae499935662334692621ec988e97a42b0c9e26e0d71312fc52970de
This Metasploit module exploits an unauthenticated command execution vulnerability in Apache Spark with standalone cluster mode through the REST API. It uses the function CreateSubmissionRequest to submit a malicious java class and triggers it.
116bdb53e7d35e2318c64aa8641d121ced48eb91bde9f964beb39633e269de98