ni

Google Launches Coronavirus Website In The United States




ni

QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation

QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code.





ni

Romanian Hacking Group Downs Tools





ni

Angry Romanian Hackers Deface Telegraph For Top Gear Toss









ni

DNS Servers Filled With Wrong Kool-Aid In Romania












ni

AV Arcade Pro 5.4.3 Cookie Manipulation

AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass.




ni

NICE Recording eXpress 6.x Root Backdoor / XSS / Bypass

NICE Recording eXpress versions 6.0.x, 6.1.x, 6.2.x, 6.3.x, and 6.5.x suffer from cross site scripting, root backdoor, unauthenticated access, fail authorization, insecure cookie handling, and remote SQL injection vulnerabilities.





ni

Microsoft Windows NtUserSetWindowFNID Win32k User Callback

An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86.




ni

Plantronics Hub SpokesUpdateService Privilege Escalation

The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default. This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). This Metasploit module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64).




ni

SOPlanning 1.45 Cross Site Request Forgery

SOPlanning version 1.45 suffers from a cross site request forgery vulnerability.




ni

P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting

P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities.




ni

QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control

QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities.




ni

GitHub Blasts Code-Scanning Tool Into All Open-Source Projects







ni

QRadar Community Edition 7.3.1.6 PHP Object Injection

QRadar Community Edition version 7.3.1.6 suffers from a php object injection vulnerability.




ni

minix-words.gz

Dictionary word list from Minix /usr/dict/words. (39214 wods)




ni

minix-dos.txt

Minix version 3.1.2a suffers from a tty panic local denial of service vulnerability.




ni

minix-panic.txt

minix version 3.1.2a suffers from a remote tty panic vulnerability.




ni

MINIX 3.3.0 Local Denial Of Service

MINIX version 3.3.0 suffers from multiple local denial of service vulnerabilities.




ni

MINIX 3.3.0 Denial Of Service

MINIX versions 3.3.0 and below remote TCP/IP stack denial of service exploit that leverages a malformed TCP option.




ni

Technical Cyber Security Alert 2007-163A

Technical Cyber Security Alert TA07-163A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Windows Secure Channel, Internet Explorer, Win32 API, Windows Mail and Outlook Express. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.




ni

Win32/XP SP3 Windows Magnifier Shellcode

52 bytes small Win32/XP SP3 windows magnifier shellcode.




ni

European Union Backs Biometric Passports




ni

UK Electronic Passports Cloned Within Minutes




ni

Hacker War Drives San Francisco Cloning RFID Passports




ni

QRadar Community Edition 7.3.1.6 Authorization Bypass

QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability.




ni

Nissan Car Secretly Shares Driver Data With Websites




ni

HP Performance Monitoring xglance Privilege Escalation

This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root.





ni

QRadar Community Edition 7.3.1.6 Path Traversal

QRadar Community Edition version 7.3.1.6 has a path traversal that exists in the session validation functionality. In particular, the vulnerability is present in the part that handles session tokens (UUIDs). QRadar fails to validate if the user-supplied token is in the correct format. Using path traversal it is possible for authenticated users to impersonate other users, and also to executed arbitrary code (via Java deserialization). The code will be executed with the privileges of the Tomcat system user.