7.5
CVSSv2

CVE-2017-14980

Published: 10/10/2017 Updated: 20/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote malicious users to have unspecified impact via a long username parameter to /login.

Vulnerable Product Search on Vulmon Subscribe to Product

flexense syncbreeze 10.0.28

Github Repositories

SyncBreeze 10028 Buffer OverFlow for Remote Code Execution [CVE-2017-14980] POST data buffer overflow, the CVE score is 75 but the impact is critical How it works? That easy BoF, rewritten by me, will overwrite the buffer and execute the shellcode Vuln machines: Windows 7 Launch: ~$ python3 SyncBreezepy <host> <port> Change the ShellCode with you

BOF is script for automation bufferOverFlow attack on sync breeze 10.0.8

Boof BOF is script for automation bufferOverFlow attack on sync breeze (SyncBreeze POST request overflow + RCE) Download $ git clone githubcom/kareemBambo/Boofgit $ cd boof $ python exploitpy -h using $ python exploitpy "IP address" "Port" for help use --help or -h Hint: script use payload from msfvenom, port listen on private network Ref