com CentOS-WebPanel.com Control Web Panel 0.9.8.846 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:55:44 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability. Full Article
com CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.848 User Enumeration By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:02:22 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. Full Article
com CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:05:24 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. Full Article
com CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:06:49 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. Full Article
com rConfig 3.9.2 Command Injection By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:58:12 GMT This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64). Full Article
com DHS Completes Live Test Of E-Passports By packetstormsecurity.com Published On :: Tue, 18 Apr 2006 02:37:48 GMT Full Article passport
com WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:08:32 GMT WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability. Full Article
com Magento WooCommerce CardGate Payment Gateway 2.0.30 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:09:50 GMT Magento WooCommerce CardGate Payment Gateway version 2.0.30 suffers from a payment process bypass vulnerability. Full Article
com QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
com TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
com TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
com QRadar Community Edition 7.3.1.6 Path Traversal By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:30:41 GMT QRadar Community Edition version 7.3.1.6 has a path traversal that exists in the session validation functionality. In particular, the vulnerability is present in the part that handles session tokens (UUIDs). QRadar fails to validate if the user-supplied token is in the correct format. Using path traversal it is possible for authenticated users to impersonate other users, and also to executed arbitrary code (via Java deserialization). The code will be executed with the privileges of the Tomcat system user. Full Article
com Intel's Commitment To Making Its Stuff Secure Is Called Into Question By packetstormsecurity.com Published On :: Mon, 08 Oct 2018 14:48:27 GMT Full Article headline flaw intel
com Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:59 GMT Full Article headline flaw patch intel
com Kimble Quits Mega To Become A Politician By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 15:22:00 GMT Full Article headline government pirate new zealand
com Kim Dotcom Mansion Raid Ruled Legal By packetstormsecurity.com Published On :: Wed, 19 Feb 2014 16:15:04 GMT Full Article headline government usa riaa mpaa pirate new zealand
com Kim Dotcom Can Be Extradited, New Zealand High Court Rules By packetstormsecurity.com Published On :: Mon, 20 Feb 2017 15:32:00 GMT Full Article headline government usa fraud riaa mpaa pirate new zealand
com Complaint Management System 4.2 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:24:07 GMT Complaint Management System version 4.2 suffers from a persistent cross site scripting vulnerability. Full Article
com WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:51:15 GMT WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability. Full Article
com Latin America Becoming Newest Malware Hotbed By packetstormsecurity.com Published On :: Fri, 03 May 2013 14:50:16 GMT Full Article headline malware cyberwar venezuela brazil scada
com WhatsApp Executives Come To Brazil To Avoid New Bans By packetstormsecurity.com Published On :: Mon, 05 Jun 2017 18:40:42 GMT Full Article headline government privacy facebook brazil cryptography
com Most Brazilians Believe Companies Don't Protect Their Data By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:54 GMT Full Article headline privacy data loss brazil
com FreeSWITCH Event Socket Command Execution By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 16:05:59 GMT This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64). Full Article
com Sagemcom Fast 3890 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:51:01 GMT This exploit uses the Cable Haunt vulnerability to open a shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The exploit serves a website that sends a malicious websocket request to the cable modem. The request will overflow a return address in the spectrum analyzer of the cable modem and using a rop chain start listening for a tcp connection on port 1337. The server will then send a payload over this tcp connection and the modem will start executing the payload. The payload will listen for commands to be run in the eCos shell on the cable modem and redirect STDOUT to the tcp connection. Full Article
com Shamoon Destroys Data At Italian Oil And Gas Company By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:51 GMT Full Article headline malware data loss italy scada
com Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:02:09 GMT Full Article headline hacker bank cybercrime fraud cyberwar scada
com Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19 By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:05 GMT Full Article headline government usa virus
com California Issues Statewide Stay At Home Order To Combat COVID-19 By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:08 GMT Full Article headline government usa virus
com Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
com From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
com NagiosXI 5.6 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:30:28 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6. Full Article
com Symantec Web Gateway 5.0.2.8 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:33:55 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8. Full Article
com NagiosXI 5.6.11 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:36:48 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11. Full Article
com Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
com Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
com Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
com Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
com QRadar Community Edition 7.3.1.6 Insecure File Permissions By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:09:24 GMT QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh. Full Article
com Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
com Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
com VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
com Suspected Commonwealth Games DDoS Was Only A Fortnite Update By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:20 GMT Full Article headline denial of service
com Broadcom Wi-Fi KR00K Proof Of Concept By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:14:05 GMT Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs. Full Article
com Cisco Data Center Network Manager 11.2.1 Command Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:51:21 GMT Cisco Data Center Network Manager version 11.2.1 remote command injection exploit. Full Article
com Irix LPD tagprinter Command Execution By packetstormsecurity.com Published On :: Tue, 27 Oct 2009 16:00:56 GMT This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Full Article
com Kernel Vulns In Android Devices Using Qualcomm Chips Explored By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:42 GMT Full Article headline hacker malware phone flaw google
com Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
com CA Common Services casrvc Privilege Escalation By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 15:22:22 GMT CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access. Full Article
com Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection By packetstormsecurity.com Published On :: Tue, 07 Mar 2017 09:32:22 GMT Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities. Full Article
com Israel Government Tells Water Treatment Companies To Change Passwords By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:10 GMT Full Article headline malware cyberwar israel scada