This Metasploit module will extract the passwords from address books on various Canon IR-Adv mfp devices. Tested models: iR-ADV C2030, iR-ADV 4045, iR-ADV C5030, iR-ADV C5235, iR-ADV C5240, iR-ADV 6055, iR-ADV C7065.
0582d21326a0606af41d486725288c35c4b40bd3a60ff4db829c637166baa8e6
This Metasploit module exploits a vulnerability in Jenkins. An unsafe deserialization bug exists on the Jenkins master, which allows remote arbitrary code execution. Authentication is not required to exploit this vulnerability.
782645570bac4c529e2ccd8ab1e298b919bf154a4c1e1619b5df9efcd12e1501