au Tesla Autopilot Duped By Phantom Images By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:20 GMT Full Article headline flaw terror
au Cisco Data Center Network Manager Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:04:06 GMT DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why). Full Article
au NSA Asks Congress To Permanently Reauthorize Spying Program By packetstormsecurity.com Published On :: Sat, 17 Aug 2019 17:56:14 GMT Full Article headline government privacy usa phone spyware nsa
au Astronaut Commits Identity Theft From Space By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 13:54:00 GMT Full Article headline bank fraud password identity theft
au Major Vuln Patched In The EU's elDAS Auth System By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:48:01 GMT Full Article headline government flaw identity theft
au rConfig 3.93 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 18:22:22 GMT rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability. Full Article
au PlaySMS index.php Unauthenticated Template Injection Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:55:45 GMT This Metasploit module exploits a preauth Server-Side Template Injection vulnerability that leads to remote code execution in PlaySMS before version 1.4.3. This issue is caused by double processing a server-side template with a custom PHP template system called TPL which is used in the PlaySMS template engine at src/Playsms/Tpl.php:_compile(). The vulnerability is triggered when an attacker supplied username with a malicious payload is submitted. This malicious payload is then stored in a TPL template which when rendered a second time, results in code execution. Full Article
au Pandora FMS Ping Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:57:47 GMT This Metasploit module exploits a vulnerability found in Pandora FMS 7.0NG and lower. net_tools.php in Pandora FMS 7.0NG allows remote attackers to execute arbitrary OS commands. Full Article
au Another Online Poker Site Caught Cheating - UltimateBet By packetstormsecurity.com Published On :: Tue, 23 Sep 2008 19:16:13 GMT Full Article gamble
au Megaupload Founder Can Sue New Zealand Spy Agency By packetstormsecurity.com Published On :: Thu, 07 Mar 2013 05:08:34 GMT Full Article headline government riaa mpaa pirate new zealand
au Kim Dotcom Releases A Video Of Megaupload Raid By packetstormsecurity.com Published On :: Thu, 13 Jun 2013 15:10:12 GMT Full Article headline government usa riaa mpaa pirate new zealand
au Kim Dotcom Plans 2017 Relaunch Of Megaupload By packetstormsecurity.com Published On :: Mon, 11 Jul 2016 14:04:42 GMT Full Article headline riaa mpaa
au Half Of Oracle E-Business Customers Open To Bank Fraud Flaw By packetstormsecurity.com Published On :: Wed, 20 Nov 2019 15:01:28 GMT Full Article headline bank cybercrime fraud flaw oracle
au CentOS Control Web Panel 0.9.8.836 Authentication Bypass By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:34:44 GMT CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. Full Article
au Awed Fraudsters Defeated By UK's Passport Interviews By packetstormsecurity.com Published On :: Tue, 25 Mar 2008 04:34:12 GMT Full Article britain fraud passport
au Passport RFIDs Cloned Wholesale By $250 eBay Auction Spree By packetstormsecurity.com Published On :: Mon, 02 Feb 2009 10:50:48 GMT Full Article passport ebay
au TP-Link TL-WR849N 0.9.1 4.16 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:29:26 GMT TP-Link TL-WR849N version 0.9.1 4.16 suffers from a firmware upload authentication bypass vulnerability. Full Article
au Intelbras Wireless N 150Mbps WRN240 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:33:24 GMT Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability. Full Article
au Oce Colorwave 500 CSRF / XSS / Authentication Bypass By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 22:03:23 GMT Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities. Full Article
au SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
au Huawei HG630 2 Router Authentication Bypass By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 10:11:11 GMT Huawei HG630 2 Router suffers from an authentication bypass vulnerability. Full Article
au QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
au Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
au ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
au Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
au Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
au TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:58:49 GMT This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team. Full Article
au Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
au IBM Data Risk Manager 2.0.3 Default Password By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:10:41 GMT This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
au Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
au Crown Prince Of Saudi Arabia Accused Of Hacking Jeff Bezos' Phone By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:44 GMT Full Article headline hacker government usa phone amazon flaw cyberwar facebook saudi arabia
au Jeff Bezos Met FBI Investigators In 2019 Over Alleged Saudi Hack By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:31 GMT Full Article headline hacker privacy malware usa phone amazon data loss spyware saudi arabia
au SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
au netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
au Megaupload Execs' Extradition May Be At Risk By packetstormsecurity.com Published On :: Fri, 25 Aug 2017 14:19:05 GMT Full Article headline government data loss riaa mpaa pirate new zealand
au Open-AudIT 3.3.0 Cross Site Scripting By packetstormsecurity.com Published On :: Sun, 26 Apr 2020 19:22:22 GMT Open-AudIT version 3.3.0 suffers from a cross site scripting vulnerability. Full Article
au Russian Malware Used In An Attempt To Sabotage Saudi Petrol Plant By packetstormsecurity.com Published On :: Wed, 24 Oct 2018 14:14:11 GMT Full Article headline hacker malware russia cyberwar saudi arabia scada
au Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
au Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
au Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
au NSClient++ 0.5.2.35 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:03:42 GMT NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability. Full Article
au Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
au Telegram DDoS Attack Launched Mostly From China By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:50 GMT Full Article headline china denial of service social
au Cisco UCS Director Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:11:07 GMT The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products. Full Article
au KVM kvm_inject_page_fault Uninitialized Memory Leak By packetstormsecurity.com Published On :: Sat, 16 Feb 2019 14:53:29 GMT KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault. Full Article
au Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:43:13 GMT An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224. Full Article
au Nanometrics Centaur 4.3.23 Memory Leak By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:17:55 GMT Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability. Full Article
au Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:58 GMT Full Article headline hacker phone apple
au Box Adds Automated Malware Detection To Box Shield By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 15:36:12 GMT Full Article headline malware
au Amiga Launches A $2,500 Quad-Core Lunchbox PC By packetstormsecurity.com Published On :: Fri, 23 Mar 2012 06:34:35 GMT Full Article headline commodore