science and technology

Microsoft Windows 7 (x86) BlueKeep RDP Use-After-Free

Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit.




science and technology

Microsoft Teams Instant Messenger DLL Hijacking

Microsoft Teams Instant Messenger application on Windows 7 SP1 fully patched is vulnerable to remote DLL hijacking.




science and technology

Plantronics Hub SpokesUpdateService Privilege Escalation

The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default. This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). This Metasploit module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64).




science and technology

Microsoft Windows 7 Screen Lock Shellcode

9 bytes small Microsoft Windows 7 screen locking shellcode.




science and technology

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).




science and technology

Red Hat Security Advisory 2019-1790-01

Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




science and technology

Red Hat Security Advisory 2019-1942-01

Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




science and technology

Red Hat Security Advisory 2019-2097-01

Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability.




science and technology

Red Hat Security Advisory 2019-2400-01

Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




science and technology

Webmin 1.920 password_change.cgi Backdoor

This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled.




science and technology

Gentoo Linux Security Advisory 201909-01

Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected.




science and technology

Debian Security Advisory 4584-1

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.




science and technology

Red Hat Security Advisory 2020-1616-01

Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability.





science and technology

JetBlue Bomb Scare Set Off With Apple AirDrop






science and technology

Boeing Code Leak Exposes Security Flaws Deep In 787s




science and technology

What Would Happen If The Whole Internet Just Shutdown All Of A Sudden?





science and technology

Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport




science and technology

Lights That Warn Planes Of Obstacles Were Exposed To Open Internet




science and technology

Pensacola Hit With Cyber Attack Hours After Shooting At Naval Base








science and technology

FBI Arrests Man Suspected Of Dozens Of Swatting Calls






science and technology

Tesla Autopilot Duped By Phantom Images





science and technology

School ERP System 1.0 Cross Site Request Forgery

School ERP System version 1.0 suffers from a cross site request forgery vulnerability.




science and technology

AVideo Platform 8.1 Cross Site Request Forgery

AVideo Platform version 8.1 suffers from a cross site request forgery vulnerability.




science and technology

Online Job Portal 1.0 Cross Site Request Forgery

Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability.




science and technology

SOPlanning 1.45 Cross Site Request Forgery

SOPlanning version 1.45 suffers from a cross site request forgery vulnerability.




science and technology

Ice HRM 26.2.0 Cross Site Request Forgery

Ice HRM version 26.2.0 suffers from a cross site request forgery vulnerability.




science and technology

Easy2Pilot 7 Cross Site Request Forgery

Easy2Pilot version 7 suffers from a cross site request forgery vulnerability.




science and technology

CandidATS 2.1.0 Cross Site Request Forgery

CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability.




science and technology

Easy2Pilot 8 SQL Injection / Cross Site Request Forgery

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.




science and technology

Business Live Chat Software 1.0 Cross Site Request Forgery

Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability.




science and technology

WordPress Tutor LMS 1.5.3 Cross Site Request Forgery

WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability.




science and technology

Wing FTP Server 6.2.3 Cross Site Request Forgery

Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability.




science and technology

HRSALE 1.1.8 Cross Site Request Forgery

HRSALE version 1.1.8 suffers from a cross site request forgery vulnerability.




science and technology

Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery

Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability.




science and technology

Exagate Sysguard 6001 Cross Site Request Forgery

Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability.




science and technology

ECK Hotel 1.0 Cross Site Request Forgery

ECK Hotel version 1.0 suffers from a cross site request forgery vulnerability.




science and technology

Red Hat Security Advisory 2020-1050-01

Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability.




science and technology

Prestashop 1.7.6.4 XSS / CSRF / Remote Code Execution

Prestashop versions 1.7.6.4 and below suffer from code execution, cross site request forgery, and cross site scripting vulnerabilities.




science and technology

P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting

P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities.