4 TOR Virtual Network Tunneling Tool 0.4.2.7 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:31:49 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
4 Stone Gets 40 Months And A Rebuke From Judge For Lying To Congress By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:35 GMT Full Article headline government usa russia fraud
4 Folder Lock 3.4.5 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 18:44:44 GMT Folder Lock version 3.4.5 for iOS suffers from multiple cross site scripting vulnerabilities. Full Article
4 S-96-74.asc By packetstormsecurity.com Published On :: Mon, 10 Jan 2000 00:31:14 GMT Subject Korn Shell (ksh) suid_exec vulnerability Date 05-dec-96 Full Article
4 Apache Shiro 1.2.4 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:05:16 GMT This Metasploit module exploits a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Apache Shiro version 1.2.4. Full Article
4 i-doit Open Source CMDB 1.14.1 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:33:53 GMT i-doit Open Source CMDB version 1.14.1 suffers from an arbitrary file deletion vulnerability. Full Article
4 RSA 2014 Security Conference App Has Severe Vulnerabilities By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 16:05:23 GMT Full Article headline privacy data loss flaw conference rsa
4 Scapy Packet Manipulation Tool 2.4.3rc2 By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 14:10:41 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
4 Scapy Packet Manipulation Tool 2.4.3rc3 By packetstormsecurity.com Published On :: Fri, 12 Jul 2019 11:58:46 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
4 Scapy Packet Manipulation Tool 2.4.3rc4 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:30:52 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
4 Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
4 WebSploit Framework 4.0.1 By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 17:22:22 GMT WebSploit is an advanced man-in-the-middle framework. Full Article
4 Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:50:43 GMT 91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode. Full Article
4 Ubuntu Security Notice USN-4184-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:13 GMT Ubuntu Security Notice 4184-2 - USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
4 Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
4 Ubuntu Security Notice USN-4185-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:24 GMT Ubuntu Security Notice 4185-3 - USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
4 Ubuntu Security Notice USN-4186-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:56:10 GMT Ubuntu Security Notice 4186-3 - USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
4 Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
4 Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
4 Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
4 Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
4 Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
4 REVULN 19Q4 Call For Papers By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 20:23:53 GMT The Call For Papers has been announced for REVULN 19Q4, an international cyber-security conference taking place December 11th and 12th, 2019 in Hong Kong at the Best Western Plus Hotel Hong Kong. Full Article
4 Linux x86_x64 sys_creat("ajit", 0755) Shellcode By packetstormsecurity.com Published On :: Sun, 29 Dec 2019 10:11:11 GMT 53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode. Full Article
4 Linux/x64_86 Egghunter Execve Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:02:22 GMT 63 bytes small Linux/x64_86 dynamic egghunter shellcode that searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. The payload is an execve(/bin/bash) shellcode. Full Article
4 Linux/x64_86 ROL Encoded Execve Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:44:44 GMT 57 bytes small Linux/x64_86 /bin/bash shellcode. The stub decodes the ROL Encoded shellcode. When the stub has finished decoding the payload, execution control is passed to the payload. Full Article
4 24 People Sentenced In India-Based Phone-Scam Case By packetstormsecurity.com Published On :: Tue, 24 Jul 2018 15:50:57 GMT Full Article headline phone india fraud
4 DotNetNuke CMS 9.4.4 Zip Directory Traversal By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:21:21 GMT DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code. Full Article
4 LimeSurvey 4.1.11 Path Traversal By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 19:22:22 GMT LimeSurvey version 4.1.11 suffers from a File Manager path traversal vulnerability. Full Article
4 Kentico CMS 12.0.14 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:59:11 GMT This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution. Full Article
4 Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure By packetstormsecurity.com Published On :: Tue, 23 Feb 2010 07:00:24 GMT Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities. Full Article
4 CuteNews 1.4.6 Insecure Cookie Handling By packetstormsecurity.com Published On :: Tue, 16 Mar 2010 23:26:53 GMT CuteNews version 1.4.6 suffers from an insecure cookie handling vulnerability. Full Article
4 AV Arcade Pro 5.4.3 Cookie Manipulation By packetstormsecurity.com Published On :: Sat, 15 Oct 2011 23:46:31 GMT AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass. Full Article
4 ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 11 Dec 2014 22:27:12 GMT ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected. Full Article
4 Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
4 Malware Boom Forces Security Vendors To Roll Out Upgrades Every 40 Minutes By packetstormsecurity.com Published On :: Tue, 08 Apr 2014 15:31:05 GMT Full Article headline malware virus cybercrime fraud symantec
4 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
4 HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
4 Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
4 Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
4 Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
4 Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
4 SOPlanning 1.45 Cross Site Request Forgery By packetstormsecurity.com Published On :: Sat, 15 Feb 2020 19:59:22 GMT SOPlanning version 1.45 suffers from a cross site request forgery vulnerability. Full Article
4 Enhanced Multimedia Router 3.0.4.27 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:50:22 GMT Enhanced Multimedia Router version 3.0.4.27 suffers from a cross site request forgery vulnerability. Full Article
4 Prestashop 1.7.6.4 XSS / CSRF / Remote Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:26:17 GMT Prestashop versions 1.7.6.4 and below suffer from code execution, cross site request forgery, and cross site scripting vulnerabilities. Full Article
4 P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:15:30 GMT P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities. Full Article
4 Edimax EW-7438RPn Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:06:13 GMT Edimax EW-7438RPn suffers from a cross site request forgery vulnerability. Full Article
4 Complaint Management System 4.2 Cross Site Request Forgery By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:31:05 GMT Complaint Management System version 4.2 suffers from a cross site request forgery vulnerability. Full Article
4 Maian Support Helpdesk 4.3 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:15:48 GMT Maian Support Helpdesk version 4.3 suffers from a cross site request forgery vulnerability. Full Article
4 ATutor 2.2.4 Arbitrary File Upload / Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:46:25 GMT ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution. Full Article