on CyberArk PSMP 10.9.1 Policy Restriction Bypass By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:02:22 GMT CyberArk PSMP versions 10.9.1 and below suffer from a policy restriction bypass vulnerability. Full Article
on SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
on Huawei HG630 2 Router Authentication Bypass By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 10:11:11 GMT Huawei HG630 2 Router suffers from an authentication bypass vulnerability. Full Article
on QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
on Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
on ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
on rConfig 3.9.4 searchField Remote Code Execution By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 14:30:26 GMT rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit. Full Article
on Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
on Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
on TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:58:49 GMT This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team. Full Article
on Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
on TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
on HP Performance Monitoring xglance Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:37:14 GMT This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root. Full Article
on TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
on Crown Prince Of Saudi Arabia Accused Of Hacking Jeff Bezos' Phone By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:44 GMT Full Article headline hacker government usa phone amazon flaw cyberwar facebook saudi arabia
on Recon Informer By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:50:32 GMT Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy. Full Article
on SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
on netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
on Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
on Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
on QRadar Community Edition 7.3.1.6 Path Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:30:41 GMT QRadar Community Edition version 7.3.1.6 has a path traversal that exists in the session validation functionality. In particular, the vulnerability is present in the part that handles session tokens (UUIDs). QRadar fails to validate if the user-supplied token is in the correct format. Using path traversal it is possible for authenticated users to impersonate other users, and also to executed arbitrary code (via Java deserialization). The code will be executed with the privileges of the Tomcat system user. Full Article
on Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses By packetstormsecurity.com Published On :: Wed, 15 Aug 2018 14:35:56 GMT Full Article headline flaw cryptography intel
on Intel's Commitment To Making Its Stuff Secure Is Called Into Question By packetstormsecurity.com Published On :: Mon, 08 Oct 2018 14:48:27 GMT Full Article headline flaw intel
on Intel Fixes Severe NUC Firmware, Web Console Vulnerabilities By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:28:10 GMT Full Article headline flaw patch intel
on Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:59 GMT Full Article headline flaw patch intel
on Kimble Sues New Zealand Government For Millions By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 15:08:24 GMT Full Article headline government usa mpaa pirate new zealand
on CISPA Is Back On The Table By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:03:55 GMT Full Article headline government privacy usa pirate nsa
on Pirate Bay Founder In Solitary Confinement Without Warrant By packetstormsecurity.com Published On :: Thu, 12 Dec 2013 17:00:50 GMT Full Article headline government pirate sweden
on Kim Dotcom Mansion Raid Ruled Legal By packetstormsecurity.com Published On :: Wed, 19 Feb 2014 16:15:04 GMT Full Article headline government usa riaa mpaa pirate new zealand
on TV Monitoring Service Is Fair Use, Judge Rules By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 04:14:16 GMT Full Article headline government pirate
on US Piracy Cyberlocker Operator Gets 3 Years In Prison, Must Pay $100k By packetstormsecurity.com Published On :: Thu, 19 Nov 2015 14:19:37 GMT Full Article headline cybercrime fraud pirate
on Megaupload Execs' Extradition May Be At Risk By packetstormsecurity.com Published On :: Fri, 25 Aug 2017 14:19:05 GMT Full Article headline government data loss riaa mpaa pirate new zealand
on Gold Galleon Hackers Target Maritime Shipping Industry By packetstormsecurity.com Published On :: Thu, 19 Apr 2018 14:06:34 GMT Full Article headline hacker pirate
on Games Of Thrones Has The Most Malware Of Any Pirated TV Show By packetstormsecurity.com Published On :: Wed, 03 Apr 2019 14:01:33 GMT Full Article headline malware mpaa pirate
on Online Scheduling System 1.0 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 19:22:22 GMT Online Scheduling System version 1.0 suffers from a persistent cross site scripting vulnerability. Full Article
on PHP-Fusion 9.03.50 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 23:03:33 GMT PHP-Fusion version 9.03.50 suffers from a persistent cross site scripting vulnerability. Full Article
on Online Clothing Store 1.0 Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:53:08 GMT Online Clothing Store version 1.0 suffers from a persistent cross site scripting vulnerability. Full Article
on Grub2 grub2-set-bootflag Environment Corruption By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 23:02:22 GMT Grub2 has grub2-set-bootflag setuid in the new Fedora release and has the ability to corrupt the environment. Full Article
on vReliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation By packetstormsecurity.com Published On :: Mon, 23 Dec 2019 21:02:43 GMT This Metasploit module exploits a vulnerability in the rds_page_copy_user function in net/rds/page.c (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8 to execute code as root (CVE-2010-3904). This module has been tested successfully on Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE and Ubuntu 10.04 (x86_64) with kernel version 2.6.32-21-generic. Full Article
on netkit-telnet 0.17 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:57:43 GMT netkit-telnet version 0.17 telnetd on Fedora 31 BraveStarr remote code execution exploit. Full Article
on Netanyahu's Party Exposes Data On Over 6.4 Million Israelis By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 14:12:58 GMT Full Article headline government privacy data loss israel
on Coronavirus Tracking App Locks Up Android Phones For Ransom By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:02 GMT Full Article headline malware virus phone google
on Fingerprint Cloning: Myth Or Reality? By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 15:36:08 GMT Full Article headline phone flaw password cisco
on Cisco IP Phone Harbors Critical RCE Flaw By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:48 GMT Full Article headline privacy phone flaw cisco
on New iOS Text Bomb Bug Can Crash Your iPhone By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:04 GMT Full Article headline phone flaw apple
on Google, Apple Tighten Protections On Contact Tracing By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:38 GMT Full Article headline privacy virus phone google apple
on Linux 5.6 IORING_OP_MADVISE Race Condition By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:22:38 GMT Linux 5.6 has an issue with IORING_OP_MADVISE racing with coredumping. Full Article
on Anonymous Continues Attacks On Brazilian Financial Sites By packetstormsecurity.com Published On :: Sun, 05 Feb 2012 05:14:07 GMT Full Article headline hacker bank brazil anonymous
on Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
on Brazil's Largest Professional Association Suffers Massive Data Leak By packetstormsecurity.com Published On :: Sun, 25 Nov 2018 22:25:26 GMT Full Article headline privacy data loss brazil