word Webex Bug Allowed Password Bypass By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:43 GMT Full Article headline privacy flaw password cisco
word Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
word WordPress Tutor LMS 1.5.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:26:06 GMT WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability. Full Article
word WordPress Event-Registration 5.43 Arbitrary File Upload By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 11:11:11 GMT WordPress Event-Registration plugin version 5.43 suffers from an arbitrary file upload vulnerability. Full Article
word Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:18:20 GMT Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3. Full Article
word minix-words.gz By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:09:33 GMT Dictionary word list from Minix /usr/dict/words. (39214 wods) Full Article
word CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:06:49 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. Full Article
word WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:08:32 GMT WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability. Full Article
word IBM Data Risk Manager 2.0.3 Default Password By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:10:41 GMT This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
word WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:51:15 GMT WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability. Full Article
word WordPress Dosimple Theme 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:52:13 GMT WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability. Full Article
word World Cup Security Center Leaks Own WiFi Password By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 13:30:32 GMT Full Article headline wireless data loss brazil
word Linux/x86_64 TCP/4444 Bindshell With Password Shellcode By packetstormsecurity.com Published On :: Sun, 18 Aug 2019 18:22:22 GMT 129 bytes small Linux/x86_64 bind (4444/TCP) shell (/bin/sh) + password (pass) shellcode. Full Article
word Linux/x86_64 Reverse Shell TCP/4444 With Password Shellcode By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 10:22:22 GMT 120 bytes small Linux/x86_64 reverse (127.0.0.1:4444/TCP) shell (/bin/sh) + password (pass) shellcode. Full Article
word Aastra IP Telephone Hardcoded Password By packetstormsecurity.com Published On :: Mon, 08 Apr 2013 20:22:22 GMT The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password. Full Article
word WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
word LastPass Stores Passwords So Securely Users Cannot Access Them By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:45:09 GMT Full Article headline denial of service password
word Verodin Director Web Console 3.5.4.0 Password Disclosure By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:46:01 GMT Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit. Full Article
word Netis E1+ 1.2.32533 Password Leak By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:41:23 GMT Netis E1+ version 1.2.32533 suffers from an unauthenticated wifi password disclosure vulnerability. Full Article
word 900,000 WordPress Sites Attacked Via XSS Vulnerabilities By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:55 GMT Full Article headline hacker flaw wordpress
word Israel Government Tells Water Treatment Companies To Change Passwords By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:10 GMT Full Article headline malware cyberwar israel scada
word This Bank Had The Worst Password Policy We've Ever Seen By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:43 GMT Full Article headline bank google password italy
word Chrome 79 Checks Your Passwords Against Public Data Breaches By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:12 GMT Full Article headline hacker data loss google password chrome
word OpenSSH 6.0p1 Magic Password Patch By packetstormsecurity.com Published On :: Thu, 28 Jun 2012 15:13:19 GMT This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password. Full Article
word The CIA's Password For Their Hacking Tools Was 123ABCdef By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:20 GMT Full Article headline hacker government data loss password cia
word password.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT Default passwords for VAX/VMS, DEC-10, TOPS 10, Full Article
word WordPress ChopSlider 3 SQL Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:47:15 GMT WordPress ChopSlider plugin version 3 suffers from a remote SQL injection vulnerability. Full Article
word Hashcat Advanced Password Recovery 4.0.0 Binary Release By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.. Full Article
word Hashcat Advanced Password Recovery 4.0.0 Source Code By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word Hashcat Advanced Password Recovery 4.0.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:17 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 4.0.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:23 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word Hashcat Advanced Password Recovery 4.1.0 Binary Release By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:20 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 4.1.0 Source Code By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:26 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word KeePass Simple Dictionary Password Enumerator By packetstormsecurity.com Published On :: Wed, 04 Apr 2018 20:51:44 GMT This is a simple perl script to perform dictionary attacks against the KeePass password manager. Full Article
word Hashcat Advanced Password Recovery 4.2.0 Binary Release By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:29:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 4.2.0 Source Code By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:31:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word Hashcat Advanced Password Recovery 4.2.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:55:55 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 4.2.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:56:22 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word Hashcat Advanced Password Recovery 5.0.0 Binary Release By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 15:56:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 5.0.0 Source Code By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 15:56:21 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word Hashcat Advanced Password Recovery 5.1.0 Binary Release By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
word Hashcat Advanced Password Recovery 5.1.0 Source Code By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:30 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
word WordPress Windows Desktop And iPhone Photo Uploader File Upload By packetstormsecurity.com Published On :: Thu, 09 Apr 2015 03:33:33 GMT WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability. Full Article
word Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 20:32:22 GMT An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
word Protecting Yourself from Malware with Better Password Security By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 22:36:00 GMT 4 In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news. Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world. Malware Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now. Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it. Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms. Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data. Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software. Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing. You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program. Tips for Protecting Yourself Against Malware Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips. Keep your operating system current. Keep your software up to date, particularly the software you use to browse the Internet. Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here). Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website. Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot. Spread the Word Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together. Password Security Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card! First, let's go over some facts. Passwords are the first line of defense to protect your personal and financial information. A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network. It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014) Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017). Best Practices for Effective Password Protection One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one. Pick a famous quote or saying and use the first letter of each word. Add a number that you can remember. Capitalize one letter. Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase. Make it between 16 and 24 characters. You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three. Additional Cybersecurity Resources In case you missed it, take a look at last week's post on recognizing suspicious emails. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. spanhidden Full Article
word New SSH Attack Weakens Passwords By packetstormsecurity.com Published On :: Fri, 17 Aug 2001 01:04:17 GMT Full Article password ssh
word Why Are We So Stupid About RDP Passwords? By www.bankinfosecurity.eu Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
word Why Are We So Stupid About RDP Passwords? By www.inforisktoday.in Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
word Why Are We So Stupid About RDP Passwords? By www.inforisktoday.asia Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
word Why Are We So Stupid About RDP Passwords? By www.inforisktoday.eu Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article