as Intelbras Wireless N 150Mbps WRN240 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:33:24 GMT Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability. Full Article
as Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:09:14 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability. Full Article
as Ivanti Workspace Manager Security Bypass By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:54:31 GMT Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability. Full Article
as Oce Colorwave 500 CSRF / XSS / Authentication Bypass By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 22:03:23 GMT Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities. Full Article
as CyberArk PSMP 10.9.1 Policy Restriction Bypass By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:02:22 GMT CyberArk PSMP versions 10.9.1 and below suffer from a policy restriction bypass vulnerability. Full Article
as HP ThinPro 6.x / 7.x Filter Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:26:56 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from an application filter bypass vulnerability. Full Article
as SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
as Huawei HG630 2 Router Authentication Bypass By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 10:11:11 GMT Huawei HG630 2 Router suffers from an authentication bypass vulnerability. Full Article
as QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
as Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
as File Explorer 1.4 Access Bypass By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:26:58 GMT File Explorer for iOS version 1.4 suffers from an access bypass vulnerability. Full Article
as ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
as Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
as TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
as IBM Data Risk Manager 2.0.3 Default Password By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:10:41 GMT This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
as Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
as WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
as British Ask Web Registrars To Blacklist Filesharing Websites By packetstormsecurity.com Published On :: Wed, 09 Oct 2013 15:23:54 GMT Full Article headline government britain riaa mpaa pirate
as Kimble Wins Back His Cars And Cash By packetstormsecurity.com Published On :: Sat, 19 Apr 2014 00:59:38 GMT Full Article headline government mpaa pirate new zealand
as Pirate Bay Founder Guilty In Historic Hacker Case By packetstormsecurity.com Published On :: Thu, 30 Oct 2014 22:35:02 GMT Full Article headline hacker riaa mpaa pirate sweden
as Games Of Thrones Has The Most Malware Of Any Pirated TV Show By packetstormsecurity.com Published On :: Wed, 03 Apr 2019 14:01:33 GMT Full Article headline malware mpaa pirate
as Easy Transfer 1.7 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:52:49 GMT Easy Transfer version 1.7 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
as WebTareas 2.0p8 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:48:57 GMT WebTareas version 2.0p8 suffers from a cross site scripting vulnerability. Full Article
as New iOS Text Bomb Bug Can Crash Your iPhone By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:04 GMT Full Article headline phone flaw apple
as World Cup Security Center Leaks Own WiFi Password By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 13:30:32 GMT Full Article headline wireless data loss brazil
as Brazil's Largest Professional Association Suffers Massive Data Leak By packetstormsecurity.com Published On :: Sun, 25 Nov 2018 22:25:26 GMT Full Article headline privacy data loss brazil
as Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
as Linux/x86_64 TCP/4444 Bindshell With Password Shellcode By packetstormsecurity.com Published On :: Sun, 18 Aug 2019 18:22:22 GMT 129 bytes small Linux/x86_64 bind (4444/TCP) shell (/bin/sh) + password (pass) shellcode. Full Article
as Linux/x86_64 Reverse Shell TCP/4444 With Password Shellcode By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 10:22:22 GMT 120 bytes small Linux/x86_64 reverse (127.0.0.1:4444/TCP) shell (/bin/sh) + password (pass) shellcode. Full Article
as Sagemcom Fast 3890 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:51:01 GMT This exploit uses the Cable Haunt vulnerability to open a shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The exploit serves a website that sends a malicious websocket request to the cable modem. The request will overflow a return address in the spectrum analyzer of the cable modem and using a rop chain start listening for a tcp connection on port 1337. The server will then send a payload over this tcp connection and the modem will start executing the payload. The payload will listen for commands to be run in the eCos shell on the cable modem and redirect STDOUT to the tcp connection. Full Article
as Shamoon Destroys Data At Italian Oil And Gas Company By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:51 GMT Full Article headline malware data loss italy scada
as Denial Of Service Event Impacted U.S. Power Utility Last Month By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:30 GMT Full Article headline usa denial of service cyberwar scada
as US And Russia Clash Over Power Grid Hack Attacks By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:50 GMT Full Article headline government usa russia cyberwar scada
as Senate Passes King Bill To Secure Energy Grid By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 15:45:57 GMT Full Article headline government usa cyberwar scada
as Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:02:09 GMT Full Article headline hacker bank cybercrime fraud cyberwar scada
as New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
as Aastra IP Telephone Crypto Failure By packetstormsecurity.com Published On :: Fri, 04 Jan 2013 01:43:44 GMT The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up. Full Article
as Aastra IP Telephone Hardcoded Password By packetstormsecurity.com Published On :: Mon, 08 Apr 2013 20:22:22 GMT The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password. Full Article
as Juniper SSL VPN Bypass / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 01:05:48 GMT This is a list of older cross site scripting and bypass vulnerabilities associated with older Juniper IVE releases. Full Article
as Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19 By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:05 GMT Full Article headline government usa virus
as Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
as Georgia Reopens Businesses As Death Toll Rises By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:10 GMT Full Article headline government usa virus
as CarolinaCon Has Been Postponed By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:12:21 GMT CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19. Full Article
as Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
as Bypassing Root Detection Mechanism By packetstormsecurity.com Published On :: Fri, 01 May 2020 02:22:22 GMT Whitepaper called Bypassing Root Detection Mechanism. Written in Persian. Full Article
as Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
as Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
as Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:15:52 GMT Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community. Full Article
as Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
as Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article