con

We Asked Def Con Attendees Why People Are Still Getting Hacked





con

Black Hat Asia 2020 Postponed Due To Coronavirus Concerns





con

rConfig 3.93 Authenticated Remote Code Execution

rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability.




con

rConfig 3.9.4 Remote Command Injection

rConfig version 3.9.4 suffers from a search.crud.php remote command injection vulnerability.




con

FreeBSD Security Advisory - FreeBSD-SA-19:09.iconv

FreeBSD Security Advisory - With certain inputs, iconv may write beyond the end of the output buffer. Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons.







con

FlashGet 1.9.6 Buffer Overflow Proof Of Concept

FlashGet version 1.9.6 remote buffer overflow proof of concept exploit.




con

CentOS Control Web Panel 0.9.8.836 Privilege Escalation

CentOS Control Web Panel version 0.9.8.836 suffers from a privilege escalation vulnerability.




con

CentOS Control Web Panel 0.9.8.836 Authentication Bypass

CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability.




con

CentOS Control Web Panel 0.9.8.838 User Enumeration

CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability.




con

CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution

CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability.




con

CentOS-WebPanel.com Control Web Panel 0.9.8.840 User Enumeration

CentOS-WebPanel.com Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability.




con

CentOS-WebPanel.com Control Web Panel 0.9.8.846 Cross Site Scripting

CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability.




con

CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.848 User Enumeration

CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability.




con

CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop

CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability.




con

CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change

CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords.




con

CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting

CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability.




con

CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery

CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability.




con

rConfig 3.9.2 Command Injection

This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64).




con

rConfig 3.9.4 searchField Remote Code Execution

rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit.




con

Vesta Control Panel Authenticated Remote Code Execution

This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed.




con

Vesta Control Panel Authenticated Remote Code Execution

This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user.




con

Recon Informer

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.




con

Intel Fixes Severe NUC Firmware, Web Console Vulnerabilities




con

Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module






con

Linux 5.6 IORING_OP_MADVISE Race Condition

Linux 5.6 has an issue with IORING_OP_MADVISE racing with coredumping.





con

CHIYU BF430 TCP IP Converter Cross Site Scripting

CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability.




con

Reminder: We're Still Bad At Securing Industrial Controllers




con

Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers




con

NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download

NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user.




con

Skippipe: Skipping The Watermark In Digital Content

Whitepaper called Skippipe: Skipping the watermark in digital content.




con

CarolinaCon Has Been Postponed

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.




con

Hackers 2 Hackers Conference 17th Edition Call For Papers

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.




con

Ivanti Workspace Control Registry Stored Credentials

A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0.




con

Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution

Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit.




con

NetBSD Stack Clash Proof Of Concept

NetBSD stack clash proof of concept exploit.




con

16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps




con

Verodin Director Web Console 3.5.4.0 Password Disclosure

Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit.




con

SWAPGS Attack Proof Of Concept

SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel.




con

Broadcom Wi-Fi KR00K Proof Of Concept

Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs.




con

Cisco M1070 Content Security Management Appliance IronPort Header Injection

Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit.