ma FBI Arrests Man Suspected Of Dozens Of Swatting Calls By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:43 GMT Full Article headline fraud terror fbi
ma Cybersecurity Lacking At Most Of The World's Major Airports By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:20 GMT Full Article headline hacker privacy data loss flaw terror
ma Tesla Autopilot Duped By Phantom Images By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:20 GMT Full Article headline flaw terror
ma Edimax EW-7438RPn Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:06:13 GMT Edimax EW-7438RPn suffers from a cross site request forgery vulnerability. Full Article
ma Complaint Management System 4.2 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:31:05 GMT Complaint Management System version 4.2 suffers from a cross site request forgery vulnerability. Full Article
ma Maian Support Helpdesk 4.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:15:48 GMT Maian Support Helpdesk version 4.3 suffers from a cross site request forgery vulnerability. Full Article
ma ATutor 2.2.4 Arbitrary File Upload / Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:46:25 GMT ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution. Full Article
ma Cisco Data Center Network Manager Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:04:06 GMT DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). Full Article
ma Joomla GMapFP 3.30 Arbitrary File Upload By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:12:53 GMT Joomla GMapFP component version 3.30 suffers from an arbitrary file upload vulnerability. Full Article
ma Smart TVs Riddled With DUMB Security Holes By packetstormsecurity.com Published On :: Thu, 06 Jun 2013 15:10:35 GMT Full Article headline flaw samsung
ma Samsung Adds Biometrics To Latest Galaxy Smartphone By packetstormsecurity.com Published On :: Tue, 25 Feb 2014 01:17:13 GMT Full Article headline phone password science samsung
ma Samsung Smart Fridge Leaves Gmail Logins Open To Attack By packetstormsecurity.com Published On :: Mon, 24 Aug 2015 13:43:16 GMT Full Article headline privacy flaw google samsung
ma Samsung LoopPay Was Hacked In March This Year By packetstormsecurity.com Published On :: Thu, 08 Oct 2015 16:20:21 GMT Full Article headline bank cybercrime data loss fraud flaw samsung
ma FAA Considers A Ban On Samsung's Exploding Smartphones By packetstormsecurity.com Published On :: Thu, 08 Sep 2016 13:26:03 GMT Full Article headline phone flaw samsung
ma Malicious SMS Messages Can Wipe A Galaxy By packetstormsecurity.com Published On :: Wed, 25 Jan 2017 15:17:50 GMT Full Article headline phone flaw samsung
ma Samsung Smart TV Pwnable Over Wi-Fi Direct By packetstormsecurity.com Published On :: Wed, 26 Apr 2017 15:45:23 GMT Full Article headline flaw samsung
ma Bugs In Samsung IoT Hub Leave Smart Home Open To Attack By packetstormsecurity.com Published On :: Fri, 27 Jul 2018 15:01:12 GMT Full Article headline hacker flaw samsung
ma Smart TVs: The Cyberthreat Lurking In Your Living Room By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:47 GMT Full Article headline government malware usa spyware backdoor samsung
ma NSA Asks Congress To Permanently Reauthorize Spying Program By packetstormsecurity.com Published On :: Sat, 17 Aug 2019 17:56:14 GMT Full Article headline government privacy usa phone spyware nsa
ma Snowden Will Make First Public Appearance Since Lawsuit By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 14:55:02 GMT Full Article headline hacker usa russia data loss cyberwar spyware nsa
ma The NSA Has Discovered A Major Flaw In Windows 10 By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:48 GMT Full Article headline government microsoft usa flaw zero day nsa
ma Qik Chat 3.0 Command Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:45:56 GMT Qik Chat version 3.0 for iOS suffers from a command injection vulnerability. Full Article
ma Equifax And Beyond: A List Of Major Breaches By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:20 GMT Full Article headline hacker privacy cybercrime data loss fraud identity theft
ma Major Vuln Patched In The EU's elDAS Auth System By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:48:01 GMT Full Article headline government flaw identity theft
ma Horde Groupware Webmail Edition 5.2.22 PHP File Inclusion By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 20:10:33 GMT Horde Groupware Webmail Edition version 5.2.22 suffers from a PHP file inclusion vulnerability. Full Article
ma PHPKB Multi-Language 9 image-upload.php Code Execution By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:57:49 GMT PHPKB Multi-Language 9 suffers from an image-upload.php remote authenticated code execution vulnerability. Full Article
ma rConfig 3.9.4 Remote Command Injection By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:08:06 GMT rConfig version 3.9.4 suffers from a search.crud.php remote command injection vulnerability. Full Article
ma Another Online Poker Site Caught Cheating - UltimateBet By packetstormsecurity.com Published On :: Tue, 23 Sep 2008 19:16:13 GMT Full Article gamble
ma Congress Passes CISPA By A Large Margin By packetstormsecurity.com Published On :: Fri, 19 Apr 2013 06:39:07 GMT Full Article headline government usa riaa mpaa pirate
ma Israeli Police Arrest Hacker Who Leaked Madonna's Music By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:47 GMT Full Article headline hacker data loss israel riaa
ma Mandriva Linux Security Advisory 2007.226 By packetstormsecurity.com Published On :: Mon, 26 Nov 2007 22:26:07 GMT Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set. Full Article
ma Mandriva Linux Security Advisory 2007.232 By packetstormsecurity.com Published On :: Thu, 29 Nov 2007 01:19:35 GMT Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set. Full Article
ma Win32/XP SP3 Windows Magnifier Shellcode By packetstormsecurity.com Published On :: Mon, 02 May 2011 23:43:16 GMT 52 bytes small Win32/XP SP3 windows magnifier shellcode. Full Article
ma CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:52:30 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. Full Article
ma rConfig 3.9.2 Command Injection By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:58:12 GMT This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64). Full Article
ma Microsoft Passport Cracked via Hotmail By packetstormsecurity.com Published On :: Mon, 05 Nov 2001 07:02:12 GMT Full Article microsoft email passport
ma Germany Rolls Out ePassport II - It's Fingerprinting Good! By packetstormsecurity.com Published On :: Thu, 01 Nov 2007 11:23:35 GMT Full Article germany passport
ma Rice Apologizes To Obama For Passport Hack By packetstormsecurity.com Published On :: Fri, 21 Mar 2008 10:40:57 GMT Full Article government passport
ma Magento WooCommerce CardGate Payment Gateway 2.0.30 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:09:50 GMT Magento WooCommerce CardGate Payment Gateway version 2.0.30 suffers from a payment process bypass vulnerability. Full Article
ma Ivanti Workspace Manager Security Bypass By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:54:31 GMT Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability. Full Article
ma ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
ma Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
ma TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
ma HP Performance Monitoring xglance Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:37:14 GMT This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root. Full Article
ma TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
ma IBM Data Risk Manager 2.0.3 Default Password By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:10:41 GMT This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
ma SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
ma Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
ma Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
ma Intel Chip Flaw - Math Unit May Spill Crypto Secrets To Apps By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 01:21:32 GMT Full Article headline data loss flaw cryptography intel