rem PHP imap_open Remote Code Execution By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:52:56 GMT The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials. Full Article
rem Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
rem Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
rem Google Removing SHA-1 Support In Chrome 56 By packetstormsecurity.com Published On :: Sat, 19 Nov 2016 04:18:33 GMT Full Article headline google chrome cryptography
rem Samsung Android Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:12:41 GMT Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia. Full Article
rem HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
rem HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
rem Zoom Remove Data-Mining LinkedIn Feature By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:22 GMT Full Article headline privacy data loss
rem Transferable Remote 1.1 XSS / LFI / Command Injection By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 03:00:01 GMT Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities. Full Article
rem Extreme Networks Aerohive HiveOS 11.x Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:35 GMT Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface. Full Article
rem qdPM Remote Code Execution By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 22:43:25 GMT qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution. Full Article
rem Cacti 1.2.8 Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:42:06 GMT graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. Full Article
rem Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
rem IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
rem Webmin 1.900 Remote Command Execution By packetstormsecurity.com Published On :: Fri, 18 Jan 2019 14:44:44 GMT This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the "Java file manager" and "Upload and Download" fields, to execute arbitrary commands with root privileges. In addition, "Running Processes" field must be authorized to discover the directory to be uploaded. A vulnerable file can be printed on the original files of the Webmin application. The vulnerable file we are uploading should be integrated with the application. Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used. The module has been tested successfully with Webmin version 1.900 over Debian 4.9.18. Full Article
rem devolo dLAN 550 duo+ 3.1.0-1 Starter Kit Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 02:33:18 GMT devolo dLAN 550 duo+ version 3.1.0-1 suffers from a remote code execution vulnerability. The devolo firmware has what seems to be a 'hidden' services which can be enabled by authenticated attacker via the the htmlmgr CGI script. This allows the attacker to start services that are deprecated or discontinued and achieve remote arbitrary code execution with root privileges. Full Article
rem Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
rem D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
rem Facebook Removes Foreign Interference Operations From Iran And Russia By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:12 GMT Full Article headline government privacy russia data loss fraud cyberwar facebook iran
rem Vulnerabilities In Two Schneider Electric ICS Products Reminiscent Of Stuxnet By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:22:40 GMT Full Article headline government malware flaw cyberwar iran scada
rem Hackers Target Remote Workers With Fake Zoom Downloader By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:16 GMT Full Article headline hacker privacy malware fraud
rem fDi’s European Regions of the Future 2020/21: Paris Region retains supremacy By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:23:53 +0000 Paris Region has kept its fDi European Region of the Future title, while Dublin Region holds on to second place and North Rhine-Westphalia is in third. Full Article
rem New Remote Bug in OpenSSH v3.3 and Below By packetstormsecurity.com Published On :: Mon, 24 Jun 2002 08:34:07 GMT Full Article ssh
rem Remote Chinese region looks to set new clean-power record By feedproxy.google.com Published On :: 2019-06-12T14:43:03Z A sparsely populated Chinese province that’s home to the headwaters of the Yangtze and Yellow rivers is attempting to set a new record for clean energy use, serving as a test bed for the entire country. Full Article Onshore News Utility Scale Wind Power
rem PNM plans early retirement of coal plant with massive addition of solar + storage By feedproxy.google.com Published On :: 2019-07-01T21:42:27Z On July 1, Public Service of New Mexico filed a plan with regulators in the state for how it plans to get to a 100 percent emission-free power by 2040. The utility reviewed four scenarios, all of which involved the early retirement of the San Juan Coal Plant, to arrive at its recommended path forward. Full Article News Utility Scale Storage Grid Scale Wind Power Solar Utility Integration
rem Hawaiian Electric Companies issue largest clean energy procurement to date; aim to end coal use, replace oil By feedproxy.google.com Published On :: 2019-08-27T14:32:35Z Last week, the Hawaiian Electric Companies began Hawai‘i’s largest procurement effort for renewable energy resources to end the use of coal and reduce reliance on imported oil for power generation, moving the state closer to its goal of using 100 percent renewable energy by 2045. Full Article DER News Utility Scale DER Utility Integration
rem Despite criticism, solar roads remain part of Georgia sustainable highway lab By feedproxy.google.com Published On :: 2019-02-27T13:54:48Z While solar roads have been criticized as impractical and inefficient, a Georgia foundation says they will continue to be part of its research lab for greener highways. Full Article Energy Efficiency Solar News
rem PNM plans early retirement of coal plant with massive addition of solar + storage By feedproxy.google.com Published On :: 2019-07-01T21:42:27Z On July 1, Public Service of New Mexico filed a plan with regulators in the state for how it plans to get to a 100 percent emission-free power by 2040. The utility reviewed four scenarios, all of which involved the early retirement of the San Juan Coal Plant, to arrive at its recommended path forward. Full Article News Utility Scale Storage Grid Scale Wind Power Solar Utility Integration
rem Despite criticism, solar roads remain part of Georgia sustainable highway lab By feedproxy.google.com Published On :: 2019-02-27T13:54:48Z While solar roads have been criticized as impractical and inefficient, a Georgia foundation says they will continue to be part of its research lab for greener highways. Full Article Energy Efficiency Solar News
rem Dedication ceremony held for 105-MW Meldahl hydroelectric plant in Kentucky By feedproxy.google.com Published On :: 2016-06-07T16:41:00Z American Municipal Power and the city of Hamilton held a dedication ceremony for the 105-MW Meldahl hydroelectric plant on June 2. Full Article Baseload
rem SNAP-Ifugao remains committed to developing 390-MW Alimit hydropower project in Philippines By feedproxy.google.com Published On :: 2016-08-29T19:22:00Z Developer SN Aboitiz Power-Ifugao has said it remains committed to developing the 390-MW Alimit hydropower project in the Philippines, pending consent from indigenous groups impacted by its construction. Full Article Baseload
rem PacifiCorp, KRRC submit FERC filings for Klamath hydropower project removal By feedproxy.google.com Published On :: 2016-09-23T19:47:00Z A pair of applications filed by the Klamath River Renewal Corporation today with the Federal Energy Regulatory Commission puts into official motion a long-standing plan to remove four hydroelectric plants on the Klamath River. Full Article Baseload
rem PNM plans early retirement of coal plant with massive addition of solar + storage By feedproxy.google.com Published On :: 2019-07-01T21:42:27Z On July 1, Public Service of New Mexico filed a plan with regulators in the state for how it plans to get to a 100 percent emission-free power by 2040. The utility reviewed four scenarios, all of which involved the early retirement of the San Juan Coal Plant, to arrive at its recommended path forward. Full Article News Utility Scale Storage Grid Scale Wind Power Solar Utility Integration
rem Hawaiian Electric Companies issue largest clean energy procurement to date; aim to end coal use, replace oil By feedproxy.google.com Published On :: 2019-08-27T14:32:35Z Last week, the Hawaiian Electric Companies began Hawai‘i’s largest procurement effort for renewable energy resources to end the use of coal and reduce reliance on imported oil for power generation, moving the state closer to its goal of using 100 percent renewable energy by 2045. Full Article DER News Utility Scale DER Utility Integration
rem Applications, Needs and Requirements for Printed Electronics in Aerospace By www.ipc.org Published On :: Presentation by Jeff Duce of Boeing Full Article
rem OEM Technology Requirements By www.ipc.org Published On :: Presentation by Eric Malo of Research In Motion Full Article
rem US Working Towards Energy Independence but Big Challenges Remain, Says Salazar By feedproxy.google.com Published On :: 2014-02-21T22:04:00Z The United States is in a good place in terms of energy, explained former Secretary of the Interior Ken Salazar during a keynote session at the MIT Energy Conference in Cambridge, Mass. Oil imports are the lowest since 1991 at 40 percent, carbon emissions are slowly dwindling, Salazar said, and the U.S. is making these positive improvements due to four cornerstones of progress. Full Article Energy Efficiency Hydropower Baseload Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
rem Remote Chinese region looks to set new clean-power record By feedproxy.google.com Published On :: 2019-06-12T14:43:03Z A sparsely populated Chinese province that’s home to the headwaters of the Yangtze and Yellow rivers is attempting to set a new record for clean energy use, serving as a test bed for the entire country. Full Article Onshore News Utility Scale Wind Power
rem PNM plans early retirement of coal plant with massive addition of solar + storage By feedproxy.google.com Published On :: 2019-07-01T21:42:27Z On July 1, Public Service of New Mexico filed a plan with regulators in the state for how it plans to get to a 100 percent emission-free power by 2040. The utility reviewed four scenarios, all of which involved the early retirement of the San Juan Coal Plant, to arrive at its recommended path forward. Full Article News Utility Scale Storage Grid Scale Wind Power Solar Utility Integration
rem Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.bankinfosecurity.co.uk Published On :: Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.databreachtoday.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
rem Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.inforisktoday.co.uk Published On :: Full Article
rem 'Zero Trust' and the Remote Worker By www.bankinfosecurity.com Published On :: The shift to working at home during the COVID-19 pandemic is yet another reason to embrace the "zero trust" strategy, says Dave Lewis of Duo Security, who provides guidance. Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.bankinfosecurity.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.inforisktoday.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.healthcareinfosecurity.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
rem Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.careersinfosecurity.co.uk Published On :: Full Article
rem 'Zero Trust' and the Remote Worker By www.govinfosecurity.com Published On :: The shift to working at home during the COVID-19 pandemic is yet another reason to embrace the "zero trust" strategy, says Dave Lewis of Duo Security, who provides guidance. Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.govinfosecurity.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
rem Webcast: Keeping Remote Workers Safe and Your Work Secure By www.careersinfosecurity.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article