ReverseBrain

5 exploits Active since Feb 2018
CVE-2019-18988 NOMISEC HIGH WORKING POC
TeamViewer Desktop <14.7.1965 - Info Disclosure
TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system.
2 stars
CVSS 7.0
CVE-2018-12421 NOMISEC CRITICAL STUB
LTB Self Service Password <1.3 - Auth Bypass
LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a user password (without knowing the old password) via a crafted POST request, because the ldap_bind return value is mishandled and the PHP data type is not constrained to be a string.
1 stars
CVSS 9.8
CVE-2018-1000049 METASPLOIT HIGH ruby WORKING POC
Nanopool Claymore Dual Miner <7.3 - RCE
Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
CVSS 7.5
CVE-2018-1000049 EXPLOITDB HIGH text WORKING POC
Nanopool Claymore Dual Miner <7.3 - RCE
Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
CVSS 7.5
EIP-2026-102144 EXPLOITDB text WORKING POC
Zyxel P-660HW-61 Firmware < 3.40(PE.11)C0 Router - Local File Inclusion