an Bluelog Bluetooth Scanner/Logger 1.1.2 By packetstormsecurity.com Published On :: Mon, 04 Nov 2013 23:40:27 GMT Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. Full Article
an DAWIN - Distributed Audit and Wireless Intrustion Notification By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 22:34:16 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
an DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:52:43 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
an man-cgi Local File Inclusion By packetstormsecurity.com Published On :: Wed, 08 Aug 2018 01:11:11 GMT man-cgi versions prior to 1.16 suffer from a local file inclusion vulnerability. Full Article
an Teltonika RUT9XX Unauthenticated OS Command Injection By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:16:15 GMT Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Full Article
an Webmin 1.900 Remote Command Execution By packetstormsecurity.com Published On :: Fri, 18 Jan 2019 14:44:44 GMT This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the "Java file manager" and "Upload and Download" fields, to execute arbitrary commands with root privileges. In addition, "Running Processes" field must be authorized to discover the directory to be uploaded. A vulnerable file can be printed on the original files of the Webmin application. The vulnerable file we are uploading should be integrated with the application. Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used. The module has been tested successfully with Webmin version 1.900 over Debian 4.9.18. Full Article
an devolo dLAN 550 duo+ 3.1.0-1 Starter Kit Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 02:33:18 GMT devolo dLAN 550 duo+ version 3.1.0-1 suffers from a remote code execution vulnerability. The devolo firmware has what seems to be a 'hidden' services which can be enabled by authenticated attacker via the the htmlmgr CGI script. This allows the attacker to start services that are deprecated or discontinued and achieve remote arbitrary code execution with root privileges. Full Article
an Imperva SecureSphere 13.x PWS Command Injection By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:19:49 GMT This Metasploit module exploits a command injection vulnerability in Imperva SecureSphere version 13.x. The vulnerability exists in the PWS service, where Python CGIs did not properly sanitize user supplied command parameters and directly passes them to corresponding CLI utility, leading to command injection. Agent registration credential is required to exploit SecureSphere in gateway mode. This module was successfully tested on Imperva SecureSphere 13.0/13.1/13.2 in pre-ftl mode and unsealed gateway mode. Full Article
an Sierra Wireless AirLink ES450 ACEManager iplogging.cgi Command Injection By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 19:32:22 GMT An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 20:32:22 GMT An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager ping_result.cgi Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected javascript code execution, resulting in the execution of javascript code running on the victim's browser. An attacker can get a victim to click a link, or embedded URL, that redirects to the reflected cross-site scripting vulnerability to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Get_Task.cgi Information Disclosure By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 23:44:44 GMT An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an information disclosure, resulting in the exposure of confidential information, including, but not limited to, plaintext passwords and SNMP community strings. An attacker can make an authenticated HTTP request, or run the binary, to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Set_Task.cgi Permission Assignment By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 23:55:55 GMT An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a arbitrary setting writes, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability. Full Article
an Sierra Wireless AirLink ES450 ACEManager template_load.cgi Information Disclosure By packetstormsecurity.com Published On :: Sat, 27 Apr 2019 17:20:43 GMT An exploitable information disclosure vulnerability exists in the ACEManager template_load.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a information leak, resulting in the disclosure of internal paths and files. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
an Debian Security Advisory 4507-1 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:54:12 GMT Debian Linux Security Advisory 4507-1 - Several vulnerabilities were discovered in Squid, a fully featured web proxy cache. The flaws in the HTTP Digest Authentication processing, the HTTP Basic Authentication processing and in the cachemgr.cgi allowed remote attackers to perform denial of service and cross-site scripting attacks, and potentially the execution of arbitrary code. Full Article
an Rifatron Intelligent Digital Security System (animate.cgi) Stream Disclosure By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:46:02 GMT The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module. Full Article
an Barco WePresent file_transfer.cgi Command Injection By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 16:16:55 GMT This Metasploit module exploits an unauthenticated remote command injection vulnerability found in Barco WePresent and related OEM'ed products. The vulnerability is triggered via an HTTP POST request to the file_transfer.cgi endpoint. Full Article
an D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
an Zen Load Balancer 3.10.1 Directory Traversal By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:32:15 GMT This Metasploit module exploits an authenticated directory traversal vulnerability in Zen Load Balancer version 3.10.1. The flaw exists in index.cgi not properly handling the filelog= parameter which allows a malicious actor to load arbitrary file path. Full Article
an Mandriva Linux Security Advisory 2015-208 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:20:27 GMT Mandriva Linux Security Advisory 2015-208 - An issue has been identified in Mandriva Business Server 2's setup package where the /etc/shadow and /etc/gshadow files containing password hashes were created with incorrect permissions, making them world-readable. This update fixes this issue by enforcing that those files are owned by the root user and shadow group, and are only readable by those two entities. Note that this issue only affected new Mandriva Business Server 2 installations. Systems that were updated from previous Mandriva versions were not affected. This update was already issued as MDVSA-2015:184, but the latter was withdrawn as it generated.rpmnew files for critical configuration files, and rpmdrake might propose the user to use those basically empty files, thus leading to loss of passwords or partition table. This new update ensures that such.rpmnew files are not kept after the update. Full Article
an Mandriva Linux Security Advisory 2015-209 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:21:20 GMT Mandriva Linux Security Advisory 2015-209 - Update PHP packages address buffer over-read and overflow vulnerabilities. PHP has been updated to version 5.5.24, which fixes these issues and other bugs. Additionally the timezonedb packages has been upgraded to the latest version and the PECL packages which requires so has been rebuilt for php-5.5.24. Full Article
an Mandriva Linux Security Advisory 2015-210 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:22:27 GMT Mandriva Linux Security Advisory 2015-210 - A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. Full Article
an Mandriva Linux Security Advisory 2015-211 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:23:02 GMT Mandriva Linux Security Advisory 2015-211 - glusterfs was vulnerable to a fragment header infinite loop denial of service attack. Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly. Full Article
an Mandriva Linux Security Advisory 2015-212 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:55:24 GMT Mandriva Linux Security Advisory 2015-212 - An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. Full Article
an Mandriva Linux Security Advisory 2015-213 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:22:00 GMT Mandriva Linux Security Advisory 2015-213 - lftp incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site. lftp was affected by this issue as it uses code from cURL for checking SSL certificates. The curl package was fixed in MDVSA-2015:098. Full Article
an Mandriva Linux Security Advisory 2015-214 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:23:00 GMT Mandriva Linux Security Advisory 2015-214 - The libksba package has been updated to version 1.3.3, which fixes an integer overflow in the DN decoder and a couple of other minor bugs. Full Article
an Mandriva Linux Security Advisory 2015-215 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:25:00 GMT Mandriva Linux Security Advisory 2015-215 - The t1utils package has been updated to version 1.39, which fixes a buffer overrun, infinite loop, and stack overflow in t1disasm. Full Article
an Mandriva Linux Security Advisory 2015-216 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:28:00 GMT Mandriva Linux Security Advisory 2015-216 - Lack of filtering in the title parameter of links to rrdPlugin allowed cross-site-scripting attacks against users of the web interface. Full Article
an Mandriva Linux Security Advisory 2015-217 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:33 GMT Mandriva Linux Security Advisory 2015-217 - SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE at the end of a SELECT statement. The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK in a CREATE TABLE statement. The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. The updated packages provides a solution for these security issues. Full Article
an Mandriva Linux Security Advisory 2015-218 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:57 GMT Mandriva Linux Security Advisory 2015-218 - Multiple vulnerabilities have been found and corrected in glibc. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. Various other issues were also addressed. The updated packages provides a solution for these security issues. Full Article
an Mandriva Linux Security Advisory 2015-220 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:17 GMT Mandriva Linux Security Advisory 2015-220 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
an Mandriva Linux Security Advisory 2015-219 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:27 GMT Mandriva Linux Security Advisory 2015-219 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When parsing HTTP cookies, if the parsed cookie's path element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
an Mandriva Linux Security Advisory 2015-221 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:19:13 GMT Mandriva Linux Security Advisory 2015-221 - Multiple vulnerabilities have been found and corrected in clamav. The updated packages provides a solution for these security issues. Full Article
an Mandriva Linux Security Advisory 2015-222 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:20:08 GMT Mandriva Linux Security Advisory 2015-222 - Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon. Full Article
an Mandriva Linux Security Advisory 2015-224 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:15:52 GMT Mandriva Linux Security Advisory 2015-224 - Ruby OpenSSL hostname matching implementation violates RFC 6125. The ruby packages for MBS2 has been updated to version 2.0.0-p645, which fixes this issue. Full Article
an Mandriva Linux Security Advisory 2015-225 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:03 GMT Mandriva Linux Security Advisory 2015-225 - The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. Full Article
an Mandriva Linux Security Advisory 2015-226 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:14 GMT Mandriva Linux Security Advisory 2015-226 - FCGI does not perform range checks for file descriptors before use of the FD_SET macro. This FD_SET macro could allow for more than 1024 total file descriptors to be monitored in the closing state. This may allow remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening many socket connections to the host and crashing the service. Full Article
an Mandriva Linux Security Advisory 2015-223 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:44 GMT Mandriva Linux Security Advisory 2015-223 - Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allow remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow. The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allows remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write. Full Article
an Mandriva Linux Security Advisory 2015-227 By packetstormsecurity.com Published On :: Tue, 05 May 2015 19:26:36 GMT Mandriva Linux Security Advisory 2015-227 - This update provides MariaDB 5.5.43, which fixes several security issues and other bugs. Full Article
an Mandriva Linux Security Advisory 2015-228 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:53:45 GMT Mandriva Linux Security Advisory 2015-228 - It was found that libuv does not call setgoups before calling setuid/setgid. This may potentially allow an attacker to gain elevated privileges. The libuv library is bundled with nodejs, and a fixed version of libuv is included with nodejs as of version 0.10.37. The nodejs package has been updated to version 0.10.38 to fix this issue, as well as several other bugs. Full Article
an Mandriva Linux Security Advisory 2015-229 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:53:59 GMT Mandriva Linux Security Advisory 2015-229 - It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code. Full Article
an Mandriva Linux Security Advisory 2015-230 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:54:10 GMT Mandriva Linux Security Advisory 2015-230 - Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields. Full Article
an Mandriva Linux Security Advisory 2015-231 By packetstormsecurity.com Published On :: Thu, 07 May 2015 15:20:41 GMT Mandriva Linux Security Advisory 2015-231 - Tilmann Haak from xing.com discovered that XML::LibXML did not respect the expand_entities parameter to disable processing of external entities in some circumstances. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used. Full Article
an Mandriva Linux Security Advisory 2015-232 By packetstormsecurity.com Published On :: Fri, 08 May 2015 13:33:14 GMT Mandriva Linux Security Advisory 2015-232 - A malformed certificate input could cause a heap overflow read in the DER decoding functions of Libtasn1. The heap overflow happens in the function _asn1_extract_der_octet(). Full Article
an Mali lures angel investors to boost start-ups By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:19 +0000 Government minister Safia Boly outlines efforts to foster entrepreneurship Full Article
an Latvia highlights anti-money laundering efforts By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:17 +0000 FDI into Latvia has recovered in recent years as the Baltic state has implemented stricter anti-money laundering procedures. Latvian minister of economics Ralfs Nemiro talks to Alex Irwin-Hunt about the progress made. Full Article
an A green future for Cape Town’s Atlantis By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:10 +0000 Atlantis in South Africa has a new SEZ focused on green manufacturing, which is hoping to turn around the area's fortunes. Annie Hessler reports. Full Article
an The UK tops Europe renewable energy ranking By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:09 +0000 The UK is the Europe's leading destination for foreign investment in green energy, followed by Spain, finds fDi’s Top European Locations for Renewable Energy Investment. Full Article
an Wireshark Analyzer 2.4.4 By packetstormsecurity.com Published On :: Fri, 12 Jan 2018 01:31:15 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article