science and technology Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
science and technology Linux/x86 Add Root User Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 17:22:22 GMT 107 bytes small Linux/x86 shellcode that adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified. Full Article
science and technology Linux/x86 Dynamic MMX+FPU Encoded Add Root User Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:22:22 GMT 155 bytes small Linux/x86 shellcode that has a MMX stub decoder that dynamically decodes the payload in memory. The FPU GetPC technique is used to determine the offset from EIP dynamically in running memory. Once decoded. this shellcode adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified. Full Article
science and technology Netis E1+ 1.2.32533 Hardcoded Backdoor Account By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:37:10 GMT Netis E1+ version 1.2.32533 suffers from having a hardcoded backdoor root account. Full Article
science and technology Red Hat Security Advisory 2020-1804-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:33:55 GMT Red Hat Security Advisory 2020-1804-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Full Article
science and technology TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
science and technology HP Performance Monitoring xglance Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:37:14 GMT This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root. Full Article
science and technology TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
science and technology IBM Data Risk Manager 2.0.3 Default Password By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:10:41 GMT This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
science and technology Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
science and technology Crown Prince Of Saudi Arabia Accused Of Hacking Jeff Bezos' Phone By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:44 GMT Full Article headline hacker government usa phone amazon flaw cyberwar facebook saudi arabia
science and technology Jeff Bezos Met FBI Investigators In 2019 Over Alleged Saudi Hack By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:31 GMT Full Article headline hacker privacy malware usa phone amazon data loss spyware saudi arabia
science and technology Multiple Vulnerabilities in MySQL - Upgrade Now By packetstormsecurity.com Published On :: Tue, 17 Dec 2002 03:08:36 GMT Full Article database mysql
science and technology MySQL Gains New Batch Of Vulns By packetstormsecurity.com Published On :: Tue, 04 Dec 2012 02:25:47 GMT Full Article headline database flaw mysql
science and technology Recon Informer By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:50:32 GMT Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy. Full Article
science and technology OpenSSL Toolkit 1.1.1f By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:43:06 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
science and technology SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
science and technology netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
science and technology Red Hat Security Advisory 2020-0860-01 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:23:22 GMT Red Hat Security Advisory 2020-0860-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 8 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-0861-01 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:23:37 GMT Red Hat Security Advisory 2020-0861-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 8 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-0855-01 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 22:02:22 GMT Red Hat Security Advisory 2020-0855-01 - Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A file read / inclusion vulnerability was addressed. Full Article
science and technology Red Hat Security Advisory 2020-0912-01 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:01:07 GMT Red Hat Security Advisory 2020-0912-01 - Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A file read / inclusion vulnerability was addressed. Full Article
science and technology Red Hat Security Advisory 2020-0961-01 By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 15:09:31 GMT Red Hat Security Advisory 2020-0961-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. A file read / inclusion vulnerability was addressed among other issues. Full Article
science and technology Red Hat Security Advisory 2020-0962-01 By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 15:10:43 GMT Red Hat Security Advisory 2020-0962-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. A file read / inclusion vulnerability was addressed among other issues. Full Article
science and technology Red Hat Security Advisory 2020-1428-01 By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 13:22:22 GMT Red Hat Security Advisory 2020-1428-01 - Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. This release of Open Liberty 20.0.0.4 serves as a replacement for Open Liberty 20.0.0.3 and includes security fixes, bug fixes, and enhancements. Full Article
science and technology Red Hat Security Advisory 2020-1479-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:14:17 GMT Red Hat Security Advisory 2020-1479-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for the Apache Tomcat package in JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to these updated packages. Full Article
science and technology Red Hat Security Advisory 2020-1478-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:14:30 GMT Red Hat Security Advisory 2020-1478-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for the Apache Tomcat package in JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to this updated package. Full Article
science and technology Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
science and technology Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
science and technology Red Hat Security Advisory 2020-1508-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:54:15 GMT Red Hat Security Advisory 2020-1508-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1507-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:05:14 GMT Red Hat Security Advisory 2020-1507-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1506-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:05:30 GMT Red Hat Security Advisory 2020-1506-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1521-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:07:26 GMT Red Hat Security Advisory 2020-1521-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.3 serves as a replacement for Red Hat JBoss Web Server 5.2, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a privilege escalation vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1520-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:09:21 GMT Red Hat Security Advisory 2020-1520-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.3 serves as a replacement for Red Hat JBoss Web Server 5.2, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a privilege escalation vulnerability. Full Article
science and technology Red Hat Security Advisory 2020-1509-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:15:11 GMT Red Hat Security Advisory 2020-1509-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1512-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:17:02 GMT Red Hat Security Advisory 2020-1512-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1514-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:00:19 GMT Red Hat Security Advisory 2020-1514-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology QRadar Community Edition 7.3.1.6 Path Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:30:41 GMT QRadar Community Edition version 7.3.1.6 has a path traversal that exists in the session validation functionality. In particular, the vulnerability is present in the part that handles session tokens (UUIDs). QRadar fails to validate if the user-supplied token is in the correct format. Using path traversal it is possible for authenticated users to impersonate other users, and also to executed arbitrary code (via Java deserialization). The code will be executed with the privileges of the Tomcat system user. Full Article
science and technology Red Hat Security Advisory 2020-1517-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:56 GMT Red Hat Security Advisory 2020-1517-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1516-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:11:05 GMT Red Hat Security Advisory 2020-1516-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1515-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:11:12 GMT Red Hat Security Advisory 2020-1515-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities. Full Article
science and technology Red Hat Security Advisory 2020-1864-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:26:29 GMT Red Hat Security Advisory 2020-1864-01 - The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Full Article
science and technology Spectre Chip Security Vulnerability Strikes Again By packetstormsecurity.com Published On :: Tue, 22 May 2018 06:36:24 GMT Full Article headline flaw intel
science and technology Intel Chip Flaw - Math Unit May Spill Crypto Secrets To Apps By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 01:21:32 GMT Full Article headline data loss flaw cryptography intel
science and technology Xen Project Patches Intel's Lazy FPU Flaw By packetstormsecurity.com Published On :: Fri, 15 Jun 2018 15:49:14 GMT Full Article headline flaw patch intel
science and technology Oracle Gets Busy With Lazy FPU Fix By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:49:59 GMT Full Article headline flaw oracle intel
science and technology WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
science and technology 007 Code Helps Stop Spectre Exploits Before They Exist By packetstormsecurity.com Published On :: Tue, 17 Jul 2018 14:19:08 GMT Full Article headline flaw patch intel
science and technology New Spectre Attack Enables Secrets To Be Leaked Over A Network By packetstormsecurity.com Published On :: Fri, 27 Jul 2018 00:57:39 GMT Full Article headline hacker flaw intel
science and technology Spec-Exec CPU Bugs Sweep Hacking Oscars By packetstormsecurity.com Published On :: Fri, 10 Aug 2018 16:07:55 GMT Full Article headline hacker flaw conference intel