I have previously disclosed a couple of bugs in Hashicorp's vagrant-vmware-fusion plugin for vagrant.Unfortunately the 4.0.23 release which was supposed to fix the previous bug I reported didn't address the issue, so Hashicorp quickly put out anotheĬheck_MK 1.2.8p25 - Information Disclosureġ. Hashicorp vagrant-vmware-fusion 4.0.24 Local Root Privilege Escalation ** Advisory InformationTitle: TP-Link Remote Code ExecutionBlog URL: : TP-LinkDate Published: CVE: CVE-2017-13772** Vulnerability SummaryNumerous remote code e # This module requires Metasploit: Current source: MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Aux Polycom Command Shell Authorization Bypass # This module requires Metasploit: Current source: MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf:: Unitrends UEB bpserverd Authentication Bypass / Remote Command Execution # This module requires Metasploit: Current source: MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ Unitrends UEB 9 HTTP API/Storage Remote Root #!/usr/bin/env python # coding: utf-8 # Description: # The vulnerability was discovered during a vulnerability research lecture. # Denial-of-service vulnerability in ArGoSoft Mini Mail Server 1.0.0.2 # and earlier allows remotĪyukov NFTP FTP Client < 2.0 - Buffer Overflow #!/usr/bin/env python # Kaltura = 13.1.0 RCE (CVE-2017-14143) # $ python kaltura_rce.py 0_xxxxxxxx system('id') # host: # entry_id: 0_xxxxxĪrGoSoft Mini Mail Server 1.0.0.2 - Denial of Service ![]() #define _GNU_SOURCE #include stdio.h #include stdlib.h #include unistd.h #include sys/types.h #include sys/wait.h #include sys/mman.h #include string.h struct cred struct task_struct typedef struct cred *(*prepare_kernel_cred_t) (struct task_struct Linux Kernel 4.14.0-rc4+ - 'waitid()' Privilege Escalation ![]() #!/usr/bin/env python # Mikogo 5.08 Local Credentials Disclosure # Vendor: Snapview GmbH # Product web page: # Affected version: 5.08 # Summary: Mikogo is a desktop sharing software application for # w Mikogo 5.08 - Local Credentials Disclosure ![]() #!/usr/bin/python # Exploit Title: Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Field Buffer Overflow (SEH)# Date: 05-10-2017# Exploit Author: Venkat Rajgor # Ven Easy MPEG/AVI/DIVX/WMV/RM To DVD Buffer Overflow
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |