ed

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).




ed

Red Hat Security Advisory 2019-1790-01

Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




ed

Red Hat Security Advisory 2019-1942-01

Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




ed

Red Hat Security Advisory 2019-2097-01

Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability.




ed

Red Hat Security Advisory 2019-2400-01

Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.




ed

Red Hat Security Advisory 2020-1616-01

Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability.





ed

Lights That Warn Planes Of Obstacles Were Exposed To Open Internet





ed

FBI Arrests Man Suspected Of Dozens Of Swatting Calls




ed

Tesla Autopilot Duped By Phantom Images





ed

Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery

Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability.




ed

Red Hat Security Advisory 2020-1050-01

Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability.




ed

QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control

QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities.




ed

Edimax EW-7438RPn Cross Site Request Forgery

Edimax EW-7438RPn suffers from a cross site request forgery vulnerability.





ed

Cisco Data Center Network Manager Unauthenticated Remote Code Execution

DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why).




ed

Smart TVs Riddled With DUMB Security Holes























ed

We Asked Def Con Attendees Why People Are Still Getting Hacked







ed

rConfig 3.93 Authenticated Remote Code Execution

rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability.




ed

Horde Groupware Webmail Edition 5.2.22 PHP File Inclusion

Horde Groupware Webmail Edition version 5.2.22 suffers from a PHP file inclusion vulnerability.




ed

Red Hat Security Advisory 2020-1112-01

Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability.




ed

PlaySMS index.php Unauthenticated Template Injection Code Execution

This Metasploit module exploits a preauth Server-Side Template Injection vulnerability that leads to remote code execution in PlaySMS before version 1.4.3. This issue is caused by double processing a server-side template with a custom PHP template system called TPL which is used in the PlaySMS template engine at src/Playsms/Tpl.php:_compile(). The vulnerability is triggered when an attacker supplied username with a malicious payload is submitted. This malicious payload is then stored in a TPL template which when rendered a second time, results in code execution.