con Wyden: Mitch McConnell Wants Foreign Hackers To Help Republicans By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:49 GMT Full Article headline government usa russia fraud cyberwar conference
con Things Learned From Monitoring Traffic At Defcon By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:24 GMT Full Article headline privacy wireless conference
con We Asked Def Con Attendees Why People Are Still Getting Hacked By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 16:22:40 GMT Full Article headline hacker conference
con DEF CON China Cancelled Due To Coronavirus By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:00 GMT Full Article headline virus china conference
con Black Hat Asia 2020 Postponed Due To Coronavirus Concerns By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:21 GMT Full Article headline china conference
con COVID-19 Visited The RSA Conference This Year By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:23 GMT Full Article headline virus conference rsa
con rConfig 3.93 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 18:22:22 GMT rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability. Full Article
con rConfig 3.9.4 Remote Command Injection By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:08:06 GMT rConfig version 3.9.4 suffers from a search.crud.php remote command injection vulnerability. Full Article
con FreeBSD Security Advisory - FreeBSD-SA-19:09.iconv By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:20:31 GMT FreeBSD Security Advisory - With certain inputs, iconv may write beyond the end of the output buffer. Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons. Full Article
con Congress Passes CISPA By A Large Margin By packetstormsecurity.com Published On :: Fri, 19 Apr 2013 06:39:07 GMT Full Article headline government usa riaa mpaa pirate
con EFF Sues US Government Over DRM Constitutionality By packetstormsecurity.com Published On :: Fri, 22 Jul 2016 15:24:22 GMT Full Article headline government usa riaa mpaa
con EU Backs Controversial Copyright Law By packetstormsecurity.com Published On :: Tue, 26 Mar 2019 14:36:19 GMT Full Article headline government riaa mpaa
con FlashGet 1.9.6 Buffer Overflow Proof Of Concept By packetstormsecurity.com Published On :: Sat, 02 May 2020 09:22:22 GMT FlashGet version 1.9.6 remote buffer overflow proof of concept exploit. Full Article
con CentOS Control Web Panel 0.9.8.836 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:32:22 GMT CentOS Control Web Panel version 0.9.8.836 suffers from a privilege escalation vulnerability. Full Article
con CentOS Control Web Panel 0.9.8.836 Authentication Bypass By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:34:44 GMT CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. Full Article
con CentOS Control Web Panel 0.9.8.838 User Enumeration By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 19:44:44 GMT CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:52:30 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel 0.9.8.840 User Enumeration By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:54:03 GMT CentOS-WebPanel.com Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel 0.9.8.846 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:55:44 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.848 User Enumeration By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:02:22 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:05:24 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. Full Article
con CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:06:49 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. Full Article
con CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:59:03 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability. Full Article
con CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:01:11 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability. Full Article
con rConfig 3.9.2 Command Injection By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:58:12 GMT This Metasploit module exploits an unauthenticated command injection vulnerability in rConfig versions 3.9.2 and prior. The install directory is not automatically removed after installation, allowing unauthenticated users to execute arbitrary commands via the ajaxServerSettingsChk.php file as the web server user. This module has been tested successfully on rConfig version 3.9.2 on CentOS 7.7.1908 (x64). Full Article
con rConfig 3.9.4 searchField Remote Code Execution By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 14:30:26 GMT rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit. Full Article
con Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
con Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
con Recon Informer By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:50:32 GMT Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy. Full Article
con Intel Fixes Severe NUC Firmware, Web Console Vulnerabilities By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:28:10 GMT Full Article headline flaw patch intel
con Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:59 GMT Full Article headline flaw patch intel
con Pirate Bay Founder In Solitary Confinement Without Warrant By packetstormsecurity.com Published On :: Thu, 12 Dec 2013 17:00:50 GMT Full Article headline government pirate sweden
con Google, Apple Tighten Protections On Contact Tracing By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:38 GMT Full Article headline privacy virus phone google apple
con Linux 5.6 IORING_OP_MADVISE Race Condition By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:22:38 GMT Linux 5.6 has an issue with IORING_OP_MADVISE racing with coredumping. Full Article
con Anonymous Continues Attacks On Brazilian Financial Sites By packetstormsecurity.com Published On :: Sun, 05 Feb 2012 05:14:07 GMT Full Article headline hacker bank brazil anonymous
con CHIYU BF430 TCP IP Converter Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:44:17 GMT CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability. Full Article
con Reminder: We're Still Bad At Securing Industrial Controllers By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:43 GMT Full Article headline flaw scada
con Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:32 GMT Full Article headline hacker cyberwar scada
con NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download By packetstormsecurity.com Published On :: Tue, 23 Jan 2018 04:51:52 GMT NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user. Full Article
con Skippipe: Skipping The Watermark In Digital Content By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 14:02:22 GMT Whitepaper called Skippipe: Skipping the watermark in digital content. Full Article
con CarolinaCon Has Been Postponed By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:12:21 GMT CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19. Full Article
con Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
con Ivanti Workspace Control Registry Stored Credentials By packetstormsecurity.com Published On :: Mon, 01 Oct 2018 17:33:45 GMT A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0. Full Article
con Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:40:45 GMT Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit. Full Article
con NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
con 16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 14:59:42 GMT Full Article headline hacker cybercrime denial of service fraud
con Verodin Director Web Console 3.5.4.0 Password Disclosure By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:46:01 GMT Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit. Full Article
con SWAPGS Attack Proof Of Concept By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:46:42 GMT SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel. Full Article
con Broadcom Wi-Fi KR00K Proof Of Concept By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:14:05 GMT Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs. Full Article
con Cisco M1070 Content Security Management Appliance IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:35:49 GMT Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit. Full Article