This Metasploit module attempts to gain root privileges by exploiting a Python code injection vulnerability in blueman versions prior to 2.0.3. The org.blueman.Mechanism.EnableNetwork D-Bus interface exposes the set_dhcp_handler function which…
>> CATEGORY: exploit
This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. It requires a CLSID string.
Coship Wireless Router versions 4.0.0.48, 4.0.0.40, 5.0.0.54, 5.0.0.55, and 10.0.0.49 suffer from an unauthenticated admin password reset vulnerability.
FortiGate FortiOS versions prior to 6.0.3 suffer from an LDAP credential disclosure vulnerability.
Roxy Fileman version 1.4.5 suffers from an arbitrary file download vulnerability.
GL-AR300M-Lite version 2.27 suffers from command injection, file download, and directory traversal vulnerabilities.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a…
doorGets CMS version 7.0 suffers from a file download vulnerability.
ShoreTel / Mitel Connect ONSITE ST14.2 suffers from a remote code execution vulnerability.
Blueimp jQuery File Upload versions 9.22.0 and below suffer from a remote file upload vulnerability.