ine

Digital Whisper Electronic Magazine #96

Digital Whisper Electronic Magazine issue 96. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #97

Digital Whisper Electronic Magazine issue 97. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #98

Digital Whisper Electronic Magazine issue 98. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #99

Digital Whisper Electronic Magazine issue 99. Written in Hebrew.




ine

Digital Whisper Electronic Magazine 100

Digital Whisper Electronic Magazine issue 100. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #101

Digital Whisper Electronic Magazine issue 101. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #102

Digital Whisper Electronic Magazine issue 102. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #103

Digital Whisper Electronic Magazine issue 103. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #105

Digital Whisper Electronic Magazine issue 105. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #106

Digital Whisper Electronic Magazine issue 106. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #107

Digital Whisper Electronic Magazine issue 107. Written in Hebrew.




ine

Digital Whisper Electronic Magazine #104

Digital Whisper Electronic Magazine issue 104. Written in Hebrew.






ine

ManageEngine 14 Remote Code Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.




ine

Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access

This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures.




ine

Source Engine CS:GO Build 4937372 Arbitrary Code Execution

Source Engine CS:GO BuildID: 4937372 arbitrary code execution exploit.




ine

ManageEngine DataSecurity Plus Path Traversal / Code Execution

ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffers from a path traversal vulnerability that can lead to remote code execution.




ine

ManageEngine Asset Explorer Windows Agent Remote Code Execution

The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected.




ine

ManageEngine EventLog Analyzer 10.0 Information Disclosure

ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability.




ine

cc-pinextract.txt

CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.










ine

xine-lib.formatstring.patch

Patch for the xine/gxine CD player that was found susceptible to a remote format string bug. The vulnerable code is found in the xine-lib library that both xine and gxine use. The vulnerable versions are at least xine-lib-0.9.13, 1.0, 1.0.1, 1.0.2 and 1.1.0.












ine

Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation

A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected.




ine

Git Credential Helper Protocol Newline Injection

A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol.




ine

Online Shopping System Advanced 1.0 SQL Injection

Online Shopping System Advanced version 1.0 suffers from a remote SQL injection vulnerability.




ine

Online Course Registration 2.0 SQL Injection

Online Course Registration 2.0 suffers from authentication bypass and remote SQL injection vulnerabilities.




ine

Online Scheduling System 1.0 SQL Injection

Online Scheduling System version 1.0 suffers from a remote SQL injection vulnerability.




ine

Pisay Online E-Learning System 1.0 SQL Injection / Code Execution

Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities.




ine

Online Clothing Store 1.0 SQL Injection

Online Clothing Store version 1.0 suffers from a remote SQL injection vulnerability.




ine

Online AgroCulture Farm Management System 1.0 SQL Injection

Online AgroCulture Farm Management System version 1.0 suffers from a remote SQL injection vulnerability.








ine

Adware From French Runs Away And Hides On 12M Machines