File tree Expand file tree Collapse file tree 2 files changed +2
-2
lines changed
documentation/modules/exploit/unix/misc
modules/exploits/unix/misc Expand file tree Collapse file tree 2 files changed +2
-2
lines changed Original file line number Diff line number Diff line change 1
1
## Vulnerable Application
2
2
3
- This module exploits the Polycom HDX Video End Points with software <= 3.0.5.
3
+ This module exploits the Polycom HDX video endpoints with software <= 3.0.5.
4
4
It was tested on a Polycom HDX 7000 running software version 3.0.3. Telnet port
5
5
23 should be accessible, as it is with the factory default configuration.
6
6
Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ def initialize(info = {})
24
24
'DisclosureDate' => 'Jan 18 2013' ,
25
25
'Description' => %q(
26
26
The login component of the Polycom Command Shell on Polycom HDX
27
- Video End Points running software versions 3.0.5 and earlier
27
+ video endpints, running software versions 3.0.5 and earlier,
28
28
is vulnerable to an authorization bypass when simultaneous
29
29
connections are made to the service, allowing remote network
30
30
attackers to gain access to a sandboxed telnet prompt without
You can’t perform that action at this time.
0 commit comments