ManageEngine OpManager V12 |LINK|
Click Here ->>->>->> https://byltly.com/2toRtH
This page contains detailed information about how to use the exploit/multi/http/opmanager_sumpdu_deserialization metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Name: ManageEngine OpManager SumPDU Java DeserializationModule: exploit/multi/http/opmanager_sumpdu_deserializationSource code: modules/exploits/multi/http/opmanager_sumpdu_deserialization.rbDisclosure date: 2021-07-26Last modification time: 2021-09-16 17:08:23 +0000Supported architecture(s): cmd, python, x86, x64Supported platform(s): Linux, Python, Unix, WindowsTarget service / protocol: http, httpsTarget network port(s): 80, 443, 3000, 8000, 8008, 8060, 8080, 8443, 8880, 8888List of CVEs: CVE-2020-28653, CVE-2021-3287 1e1e36bf2d