ces

SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion

SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks.




ces

ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling

ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected.





ces

Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices






ces

QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control

QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities.





ces

State Department Passport Snoop Faces Little Or No Jail Time




ces

File Explorer 1.4 Access Bypass

File Explorer for iOS version 1.4 suffers from an access bypass vulnerability.




ces

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices




ces

Juniper Secure Access Cross Site Scripting

Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected.




ces

Juniper Secure Access Cross Site Scripting

Juniper Secure Access software suffers from a reflective cross site scripting vulnerability.




ces

Juniper Secure Access SSL VPN Privilege Escalation

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.




ces

Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access

This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures.




ces

VMware Host VMX Process COM Class Hijack Privilege Escalation

The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15.




ces

Poor Protocol Design For IoT Devices Fueling DDoS





ces

Ubisoft Sues Operators Of Four DDoS For Hire Services




ces

LastPass Stores Passwords So Securely Users Cannot Access Them






ces

CA Common Services casrvc Privilege Escalation

CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access.








ces

Google Chrome To Block Heavy Ads That Use Too Many Resources










ces

NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability

Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability.








ces

Brain Hack Devices Must Be Scrutinized, Say Top Scientists





ces

FreeBSD Bug Grants Local Root Access




ces

FreeBSD Bug Gives Untrusted Root Access





ces

Hacking iOS Devices

Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish.




ces

What makes a successful free zone?

Dr Samir Hamrouni, CEO of the World Free Zones Organization, outlines the attributes that are essential to flourishing free zones.




ces

Synaccess netBooter NP-02x / NP-08x 6.8 Authentication Bypass

Synaccess netBooter NP-02x and NP-08x version 6.8 suffer from an authentication bypass vulnerability due to a missing control check when calling the webNewAcct.cgi script while creating users. This allows an unauthenticated attacker to create an admin user account and bypass authentication giving her the power to turn off a power supply to a resource.