<div dir="ltr">

<div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)">Hi, List,<div><br></div><div>1.30 ver. of DefPack contains 3 modules. List:</div></div><div style="text-align:start;text-indent:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px"><br></div><div><div><span style="font-size:12.8px">- HPE Intelligent Management Center File Upload RCE [0-Day]</span></div><div><span style="font-size:12.8px">- Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Privilege Escalation Exploit</span></div><div><span style="font-size:12.8px">- Cisco RV132W/RV134W ADSL2+ Wireless-N/AC VPN Routers - Information Disclosure [CVE-2018-0125]</span></div></div></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><div><br></div><div>Happy pentesting,</div><div><a href="http://gleg.net/" target="_blank" style="color:rgb(17,85,204)">Gleg`s Security team</a></div><div>Follow us on Twitter: <a href="https://twitter.com/GlegExploitPack" target="_blank" style="color:rgb(17,85,204)">GlegExploitPack</a></div></div>

<br></div>