9
CVSSv2

CVE-2015-7765

Published: 09/10/2015 Updated: 09/10/2015
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 905
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

ZOHO ManageEngine OpManager 11.5 build 11600 and previous versions uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.

Vulnerable Product Search on Vulmon Subscribe to Product

zohocorp manageengine opmanager 11.5

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote # It removes large object in database, shoudn't be a problem, but just in case Rank = ManualRanking include Msf::Exploit::Remote::HttpCli ...

Github Repositories

Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS

Juniper CVE-2015-7755 & CVE-2015-7756 This repository contains notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS For more information about these issues, please see the URLs below: forumsjunipernet/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 h