science and technology US To Issue Wireless Passports By packetstormsecurity.com Published On :: Fri, 04 Jan 2008 22:55:23 GMT Full Article usa wireless passport
science and technology Rice Apologizes To Obama For Passport Hack By packetstormsecurity.com Published On :: Fri, 21 Mar 2008 10:40:57 GMT Full Article government passport
science and technology Awed Fraudsters Defeated By UK's Passport Interviews By packetstormsecurity.com Published On :: Tue, 25 Mar 2008 04:34:12 GMT Full Article britain fraud passport
science and technology UK Electronic Passports Cloned Within Minutes By packetstormsecurity.com Published On :: Thu, 07 Aug 2008 22:39:58 GMT Full Article britain passport
science and technology THC/vonJeek Provide You The Ability To Clone ePassports By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 17:01:48 GMT Full Article passport
science and technology Passport Snoop Snared By packetstormsecurity.com Published On :: Tue, 13 Jan 2009 15:13:54 GMT Full Article passport
science and technology State Department Passport Snoop Faces Little Or No Jail Time By packetstormsecurity.com Published On :: Wed, 14 Jan 2009 20:24:13 GMT Full Article passport
science and technology Passport RFIDs Cloned Wholesale By $250 eBay Auction Spree By packetstormsecurity.com Published On :: Mon, 02 Feb 2009 10:50:48 GMT Full Article passport ebay
science and technology Hacker War Drives San Francisco Cloning RFID Passports By packetstormsecurity.com Published On :: Mon, 02 Feb 2009 14:33:30 GMT Full Article hacker usa passport rfid
science and technology South Africa Rolls Out Biometric Passports By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:29:31 GMT Full Article africa passport
science and technology Interpol Issues Arrest Warrant For Fake Passport Hit Team By packetstormsecurity.com Published On :: Fri, 19 Feb 2010 16:20:00 GMT Full Article passport
science and technology Hackers Expose Security Flaws With Elvis Presley Passport By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:24:09 GMT Full Article hacker flaw passport
science and technology Foreign Office Changes Tourist Advice After Israeli Inquiry By packetstormsecurity.com Published On :: Wed, 24 Mar 2010 11:54:02 GMT Full Article israel passport
science and technology Yet Another Hacker Harassed At Customs By packetstormsecurity.com Published On :: Fri, 19 Nov 2010 16:42:49 GMT Full Article headline hacker government privacy passport
science and technology Red Hat Security Advisory 2020-0464-01 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:03:06 GMT Red Hat Security Advisory 2020-0464-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a bypass vulnerability. Full Article
science and technology DotNetNuke CMS 9.5.0 File Extension Check Bypass By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:09:45 GMT DotNetNuke CMS version 9.5.0 suffers from file extension check bypass vulnerability that allows for arbitrary file upload. Full Article
science and technology WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:08:32 GMT WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability. Full Article
science and technology Magento WooCommerce CardGate Payment Gateway 2.0.30 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:09:50 GMT Magento WooCommerce CardGate Payment Gateway version 2.0.30 suffers from a payment process bypass vulnerability. Full Article
science and technology TP-Link TL-WR849N 0.9.1 4.16 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:29:26 GMT TP-Link TL-WR849N version 0.9.1 4.16 suffers from a firmware upload authentication bypass vulnerability. Full Article
science and technology Intelbras Wireless N 150Mbps WRN240 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:33:24 GMT Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-0734-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:21 GMT Red Hat Security Advisory 2020-0734-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-0652-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:29 GMT Red Hat Security Advisory 2020-0652-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a bypass vulnerability. Full Article
science and technology Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:09:14 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability. Full Article
science and technology Ivanti Workspace Manager Security Bypass By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:54:31 GMT Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability. Full Article
science and technology Oce Colorwave 500 CSRF / XSS / Authentication Bypass By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 22:03:23 GMT Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities. Full Article
science and technology CyberArk PSMP 10.9.1 Policy Restriction Bypass By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:02:22 GMT CyberArk PSMP versions 10.9.1 and below suffer from a policy restriction bypass vulnerability. Full Article
science and technology HP ThinPro 6.x / 7.x Filter Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:26:56 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from an application filter bypass vulnerability. Full Article
science and technology SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
science and technology Red Hat Security Advisory 2020-1021-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 20:22:22 GMT Red Hat Security Advisory 2020-1021-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include a bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1268-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:21:44 GMT Red Hat Security Advisory 2020-1268-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1346-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:40 GMT Red Hat Security Advisory 2020-1346-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
science and technology Django 3.0 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:43:36 GMT Django version 3.0 suffers from a cross site request forgery token bypass vulnerability. Full Article
science and technology Huawei HG630 2 Router Authentication Bypass By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 10:11:11 GMT Huawei HG630 2 Router suffers from an authentication bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1462-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:04:44 GMT Red Hat Security Advisory 2020-1462-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1475-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:13:27 GMT Red Hat Security Advisory 2020-1475-01 - Red Hat CodeReady Workspaces 2.1.0 provides a cloud developer-workspace server and a browser-based IDE built for teams and organizations. CodeReady Workspaces runs in OpenShift and is well-suited for container-based development. Issues addressed include a bypass vulnerability. Full Article
science and technology QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
science and technology Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
science and technology File Explorer 1.4 Access Bypass By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:26:58 GMT File Explorer for iOS version 1.4 suffers from an access bypass vulnerability. Full Article
science and technology ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
science and technology Nissan Car Secretly Shares Driver Data With Websites By packetstormsecurity.com Published On :: Tue, 14 Jun 2011 00:52:18 GMT Full Article headline data loss car
science and technology Ubuntu Security Notice USN-4171-5 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:20:58 GMT Ubuntu Security Notice 4171-5 - USN-4171-1 fixed vulnerabilities in Apport. This caused a regression in autopkgtest and python2 compatibility. This update fixes the problem. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled lock-file creation. This could be used by a local attacker to cause a denial of service against Apport. Kevin Backhouse discovered Apport read various process-specific files with elevated privileges during crash dump generation. This could could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Various other issues were also addressed. Full Article
science and technology Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
science and technology Linux PTRACE_TRACEME Local Root By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 15:11:15 GMT Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique. Full Article
science and technology rConfig 3.9.4 searchField Remote Code Execution By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 14:30:26 GMT rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit. Full Article
science and technology Ubuntu Security Notice USN-4312-1 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:49:27 GMT Ubuntu Security Notice 4312-1 - Matthias Gerstner discovered that Timeshift did not securely create temporary files. An attacker could exploit a race condition in Timeshift and potentially execute arbitrary commands as root. Full Article
science and technology Red Hat Security Advisory 2020-1308-01 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:50:51 GMT Red Hat Security Advisory 2020-1308-01 - The org.ovirt.engine-root is a core component of oVirt. Full Article
science and technology Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
science and technology Linux 5.3 Insecure Root Path Handling By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 22:01:02 GMT Linux versions 5.3 and above appear to have an issue where io_uring suffers from insecure handling of the root directory for path lookups. Full Article
science and technology Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
science and technology TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:58:49 GMT This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team. Full Article