ni

Secunia Security Advisory 48720

Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks.




ni

Secunia Security Advisory 49587

Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Juniper Networks Mobility System, which can be exploited by malicious people to conduct cross-site scripting attacks.




ni

Secunia Security Advisory 51832

Secunia Security Advisory - A vulnerability has been reported in Juniper JunosE, which can be exploited by malicious people to cause a DoS (Denial of Service).




ni

Juniper Secure Access Cross Site Scripting

Juniper Secure Access software suffers from a reflective cross site scripting vulnerability.




ni

Juniper JunOS 9.x Cross Site Scripting

Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks.




ni

Juniper SSG20 Denial Of Service

A special crafted ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20.




ni

Juniper Secure Access SSL VPN Privilege Escalation

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.





ni

Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say




ni

Running Encrypted ELF Binaries In Memory

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.




ni

Bypassing Root Detection Mechanism

Whitepaper called Bypassing Root Detection Mechanism. Written in Persian.




ni

Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass

Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community.




ni

QRadar Community Edition 7.3.1.6 Insecure File Permissions

QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh.




ni

Secunia Security Advisory 46127

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges.




ni

Secunia Security Advisory 47236

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges.




ni

Secunia Security Advisory 47279

Secunia Security Advisory - NetBSD has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).




ni

Secunia Security Advisory 49440

Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.




ni

Secunia Security Advisory 49264

Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library.




ni

Secunia Security Advisory 49516

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges.




ni

UK CPNI IPv6 Toolkit 1.1

This toolkit house various IPv6 tool that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 8.2, NetBSD 5.1, OpenBSD 5.0, and Ubuntu 11.10.




ni

Secunia Security Advisory 50054

Secunia Security Advisory - NetBSD has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).




ni

UK CPNI IPv6 Toolkit 1.2.3

This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10.




ni

Suspected Commonwealth Games DDoS Was Only A Fortnite Update




ni

California Man Arrested For DDoS'ing Candidate's Website




ni

Cisco WLC 2504 8.9 Denial Of Service

Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability.




ni

Cisco Unified Contact Center Express Privilege Escalation

Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.




ni

Cisco IP Phone 11.7 Denial Of Service

Cisco IP Phone version 11.7 denial of service proof of concept exploit.




ni

KVM kvm_inject_page_fault Uninitialized Memory Leak

KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault.




ni

Secunia Security Advisory 14875

Secunia Security Advisory - Two vulnerabilities have been reported in SGI IRIX, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and disclose some sensitive information.




ni

Secunia Security Advisory 15619

Secunia Security Advisory - A security issue has been reported in SGI IRIX, which potentially can be exploited by malicious users to disclose and modify sensitive information.




ni

Secunia Security Advisory 15785

Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system.




ni

IRIX Local Kernel Memory Disclosure / Denial Of Service

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.




ni

Secunia Security Advisory 42874

Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service).





ni

Dridex Trojan Updated With AtomBombing Evasion Techniques










ni

Dovecot 2.3 Denial Of Service

Dovecot version 2.3 suffers from multiple denial of service conditions. Included in this archive is the advisory as well as patches to address the issue.








ni

Secunia Security Advisory 30197

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system.




ni

Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service

Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.




ni

Quest InTrust Annotation Objects Uninitialized Pointer

This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser.




ni

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.