0 Gentoo Linux Security Advisory 202004-16 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:33 GMT Gentoo Linux Security Advisory 202004-16 - Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. Versions less than 1.2.11 are affected. Full Article
0 Gentoo Linux Security Advisory 202004-17 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:38 GMT Gentoo Linux Security Advisory 202004-17 - Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation. Versions less than 2.2.11 are affected. Full Article
0 Create-Project Manager 1.07 Cross Site Scripting / HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:30:17 GMT Create-Project Manager version 1.07 suffers from cross site scripting and html injection vulnerabilities. Full Article
0 Red Hat Security Advisory 2019-1833-01 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 14:44:44 GMT Red Hat Security Advisory 2019-1833-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. This update fixes various bugs and adds enhancements. Full Article
0 Red Hat Security Advisory 2019-1948-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:14:13 GMT Red Hat Security Advisory 2019-1948-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. A name equality check issue was addressed. Full Article
0 Red Hat Security Advisory 2019-1972-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:55:42 GMT Red Hat Security Advisory 2019-1972-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability. Full Article
0 Red Hat Security Advisory 2019-2028-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:58:01 GMT Red Hat Security Advisory 2019-2028-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
0 Red Hat Security Advisory 2019-2466-01 By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:33:46 GMT Red Hat Security Advisory 2019-2466-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. An improper authorization issue was addressed. Full Article
0 Red Hat Security Advisory 2019-2565-01 By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:30:34 GMT Red Hat Security Advisory 2019-2565-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. An OpenSSL issue was addressed where an X509 name equality check did not work correctly. Full Article
0 Red Hat Security Advisory 2019-2587-01 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 14:07:44 GMT Red Hat Security Advisory 2019-2587-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include code execution and denial of service vulnerabilities. Full Article
0 Red Hat Security Advisory 2019-2806-01 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:27:44 GMT Red Hat Security Advisory 2019-2806-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability. Full Article
0 Ubuntu Security Notice USN-4201-1 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:23:06 GMT Ubuntu Security Notice 4201-1 - It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed. Full Article
0 Red Hat Security Advisory 2019-4201-01 By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 01:28:02 GMT Red Hat Security Advisory 2019-4201-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include a denial of service vulnerability. Full Article
0 Red Hat Security Advisory 2020-0542-01 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:07:18 GMT Red Hat Security Advisory 2020-0542-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
0 Red Hat Security Advisory 2020-0588-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:17:25 GMT Red Hat Security Advisory 2020-0588-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
0 Red Hat Security Advisory 2020-0589-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:18:00 GMT Red Hat Security Advisory 2020-0589-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A remote code execution vulnerability has been addressed. Full Article
0 Red Hat Security Advisory 2020-0591-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:23:22 GMT Red Hat Security Advisory 2020-0591-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
0 Red Hat Security Advisory 2020-0663-01 By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 16:33:42 GMT Red Hat Security Advisory 2020-0663-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
0 Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
0 Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
0 US Navy Wants 350 Billion Social Media Posts By packetstormsecurity.com Published On :: Tue, 28 May 2019 14:59:52 GMT Full Article headline government usa cyberwar facebook social twitter military
0 Xcon2005_San.pdf By packetstormsecurity.com Published On :: Wed, 31 Aug 2005 10:17:25 GMT Xcon 2005: Hacking Windows CE Full Article
0 SYMSA-2007-012.txt By packetstormsecurity.com Published On :: Tue, 23 Oct 2007 18:13:58 GMT Symantec Vulnerability Research SYMSA-2007-012 - Microsoft Windows CE suffers from a IGMP related denial of service vulnerability. Full Article
0 Secunia Security Advisory 30197 By packetstormsecurity.com Published On :: Mon, 12 May 2008 22:24:40 GMT Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Article
0 Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
0 Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
0 MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
0 SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 06 Mar 2014 03:15:49 GMT This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN). Full Article
0 MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
0 MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
0 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
0 160,000 Nintendo Accounts Were Compromised By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:18 GMT Full Article headline hacker privacy data loss nintendo password
0 Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
0 Turkey Fines Facebook $282,000 Over Data Breach By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:35 GMT Full Article headline government privacy data loss turkey facebook
0 GNUnet P2P Framework 0.11.5 By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 16:11:23 GMT GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing. Full Article
0 Nmap Port Scanner 7.80 By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 17:43:45 GMT Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full Article
0 nullscan 1.0.0 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:56:25 GMT nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated. Full Article
0 Samhain File Integrity Checker 4.4.0 By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 22:21:09 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
0 SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
0 Oracle Solaris 11.x / 10 whodo / w Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:38:30 GMT A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges. Full Article
0 VB-98.07.OpenVMS.LOGINOUT By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:51:46 GMT A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered. Full Article
0 NetBSD-SA1999-012.vax.ptrace By packetstormsecurity.com Published On :: Thu, 23 Sep 1999 04:08:42 GMT NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here. Full Article
0 S-93-07.asc By packetstormsecurity.com Published On :: Mon, 10 Jan 2000 00:31:14 GMT Subject VAX/VMS failure to disable user accounts Date 13-Feb-93 Full Article
0 COVERT-2000-07.listserv By packetstormsecurity.com Published On :: Wed, 26 Jul 2000 00:22:33 GMT Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX. Full Article
0 State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:29 GMT Full Article headline hacker government dns cyberwar
0 Over 28,000 Web Domains Suspended For Criminal Activity By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:30 GMT Full Article headline dns cybercrime fraud
0 Microsoft Takes Down 50 Domains Operated By North Korean Hackers By packetstormsecurity.com Published On :: Tue, 31 Dec 2019 14:51:18 GMT Full Article headline hacker microsoft dns cyberwar korea
0 pArAnoIA Browser 0.1 By packetstormsecurity.com Published On :: Thu, 11 Jul 2019 03:33:33 GMT pArAnoIA is a toolkit designed to surf the Internet. It's a browser with TOR built-in, spoofing of user-agent and other functions, ensures strict use of TLS, and more. Full Article
0 Ubuntu Security Notice USN-4054-1 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 12:22:22 GMT Ubuntu Security Notice 4054-1 - A sandbox escape was discovered in Firefox. If a user were tricked in to installing a malicious language pack, an attacker could exploit this to gain additional privileges. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass same origin restrictions, conduct cross-site scripting attacks, conduct cross-site request forgery attacks, spoof origin attributes, spoof the addressbar contents, bypass safebrowsing protections, or execute arbitrary code. Various other issues were also addressed. Full Article
0 SAPUI5 1.0.0 / SAP Gateway 7.5 / 7.51 / 7.52 / 7.53 Content Spoofing By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 02:22:22 GMT SAPUI5 version 1.0.0 and the SAP Gateway versions 7.5, 7.51, 7.52 and 7.53are vulnerable to content spoofing in multiple parameters. Full Article