[dos] VBScript – 'OLEAUT32!VariantClear' and 'scrrun!VBADictionary::put_Item' Use-After-Free
VBScript – ‘OLEAUT32!VariantClear’ and ‘scrrun!VBADictionary::put_Item’ Use-After-Free
Tags: 0day, remote exploit[local] xorg-x11-server < 1.20.3 – 'modulepath' Local Privilege Escalation
[local] HTML5 Video Player 1.2.5 – Buffer Overflow (Metasploit)
[dos] Linux Kernel 4.8 (Ubuntu 16.04) – Leak sctp Kernel Pointer
[webapps] Synaccess netBooter NP-02x/NP-08x 6.8 – Authentication Bypass
[dos] VBScript – 'rtFilter' Out-of-Bounds Read
[webapps] Schneider Electric PLC – Session Calculation Authentication Bypass
TeamCity Agent XML-RPC Command Execution
This Metasploit module allows remote code execution on TeamCity Agents configured to use bidirectional communication via xml-rpc. In bidirectional mode the TeamCity server pushes build commands to the Build Agents over port TCP/9090 without requiring authentication. Up until version 10 this was the default configuration. This Metasploit module supports TeamCity agents from version 6.0 onwards.
Mac OS X libxpc MITM Privilege Escalation
This Metasploit module exploits a vulnerability in libxpc on macOS versions 10.13.3 and below. The task_set_special_port API allows callers to overwrite their bootstrap port, which is used to communicate with launchd. This port is inherited across forks: child processes will use the same bootstrap port as the parent. By overwriting the bootstrap port and forking […]