Apache Spark – Unauthenticated Command Execution (Metasploit)
>> ARCHIVE: 2018-11
Apache Spark – Unauthenticated Command Execution (Metasploit)
VBScript – ‘OLEAUT32!VariantClear’ and ‘scrrun!VBADictionary::put_Item’ Use-After-Free
xorg-x11-server < 1.20.3 – 'modulepath' Local Privilege Escalation
HTML5 Video Player 1.2.5 – Buffer Overflow (Metasploit)
Linux Kernel 4.8 (Ubuntu 16.04) – Leak sctp Kernel Pointer
Synaccess netBooter NP-02x/NP-08x 6.8 – Authentication Bypass
VBScript – ‘rtFilter’ Out-of-Bounds Read
Schneider Electric PLC – Session Calculation Authentication Bypass
This Metasploit module allows remote code execution on TeamCity Agents configured to use bidirectional communication via xml-rpc. In bidirectional mode the TeamCity server pushes build commands to the Build Agents…
This Metasploit module exploits a vulnerability in libxpc on macOS versions 10.13.3 and below. The task_set_special_port API allows callers to overwrite their bootstrap port, which is used to communicate with…