io

Wapiti Web Application Vulnerability Scanner 3.0.3

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.




io

FreeBSD Security Advisory - ntp Authentication Bypass

FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed.




io

Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation

Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities.




io

Key Reinstallation: Forcing Nonce Reuse In WPA2

Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected.




io

Primefaces 5.x Remote Code Execution

This Metasploit module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.




io

RSA BSAFE Micro Edition Suite / Crypto-C Micro Edition Overflow / DoS

RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition suffer from resource exhaustion, integer overflow, improper clearing of heap memory, covert timing channel, and buffer over-read vulnerabilities.







io

Google Chrome 80 JSCreate Side-Effect Type Confusion

This Metasploit module exploits an issue in Google Chrome version 80.0.3987.87 (64 bit). The exploit corrupts the length of a float array (float_rel), which can then be used for out of bounds read and write on adjacent memory. The relative read and write is then used to modify a UInt64Array (uint64_aarw) which is used for read and writing from absolute memory. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, so the browser must be run with the --no-sandbox option for the payload to work correctly.






io

CloudFlare Probes Mystery Interception Of Site Traffic Across India









io

Scam Call Center Owner In Custody After BBC Investigation





io

Citrix Application Delivery Controller / Gateway Remote Code Execution / Traversal

Citrix Application Delivery Controller and Citrix Gateway directory traversal remote code execution exploit.




io

Lotus Core CMS 1.0.1 Local File Inclusion

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.




io

SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion

SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks.




io

Apache Tomcat AJP Ghostcat File Read / Inclusion

Apache Tomcat AJP Ghostcat file read and inclusion exploit.




io

FIBARO System Home Center 5.021 Remote File Inclusion / XSS

FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities.




io

QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation

QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code.







io

PhreeBooks ERP 5.2.5 Remote Command Execution

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.




io

Kentico CMS 12.0.14 Remote Command Execution

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.




io

AV Arcade 3 Insecure Cookie / SQL Injection

AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities.




io

AV Arcade Pro 5.4.3 Cookie Manipulation

AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass.




io

ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling

ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected.




io

Totaljs CMS 12.0 Insecure Admin Session Cookie

Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password.




io

Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs







io

High Severity Cisco Flaw In IOS XE Enables Device Takeover





io

Symantec Endpoint Protection Race Condition

Symantec Endpoint Protection versions 14.2.5323.2000, 14.2.5569.2100, and 14.2.5587.2100 suffer from a race condition vulnerability.





io

Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation

Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit.




io

Plantronics Hub SpokesUpdateService Privilege Escalation

The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default. This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). This Metasploit module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64).




io

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).






io

Easy2Pilot 8 SQL Injection / Cross Site Request Forgery

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.




io

Prestashop 1.7.6.4 XSS / CSRF / Remote Code Execution

Prestashop versions 1.7.6.4 and below suffer from code execution, cross site request forgery, and cross site scripting vulnerabilities.