ut Backdoor Found In Utility For Linux, Unix Servers By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:35 GMT Full Article headline hacker flaw backdoor conference
ut IBM Pulls Out Of RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:00:54 GMT Full Article headline ibm conference rsa
ut PHP-FPM 7.x Remote Code Execution By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 21:03:50 GMT This Metasploit module exploits an underflow vulnerability in PHP-FPM versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 of PHP-FPM on Nginx. Only servers with certain Nginx + PHP-FPM configurations are exploitable. This is a port of the original neex's exploit code (see refs). First, it detects the correct parameters (Query String Length and custom header length) needed to trigger code execution. This step determines if the target is actually vulnerable (Check method). Then, the exploit sets a series of PHP INI directives to create a file locally on the target, which enables code execution through a query string parameter. This is used to execute normal payload stagers. Finally, this module does some cleanup by killing local PHP-FPM workers (those are spawned automatically once killed) and removing the created local file. Full Article
ut rConfig 3.93 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 18:22:22 GMT rConfig version 3.93 suffers from an authenticated ajaxAddTemplate.php remote code execution vulnerability. Full Article
ut PHPKB Multi-Language 9 image-upload.php Code Execution By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:57:49 GMT PHPKB Multi-Language 9 suffers from an image-upload.php remote authenticated code execution vulnerability. Full Article
ut Horde 5.2.22 CSV Import Code Execution By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:17:25 GMT The Horde_Data module version 2.1.4 (and before) present in Horde Groupware version 5.2.22 allows authenticated users to inject arbitrary PHP code thus achieving remote code execution the server hosting the web application. Full Article
ut Pandora FMS 7.0NG Remote Code Execution By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:17:41 GMT Pandora FMS version 7.0NG suffers from a net_tools.php remote code execution vulnerability. Full Article
ut PlaySMS index.php Unauthenticated Template Injection Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:55:45 GMT This Metasploit module exploits a preauth Server-Side Template Injection vulnerability that leads to remote code execution in PlaySMS before version 1.4.3. This issue is caused by double processing a server-side template with a custom PHP template system called TPL which is used in the PlaySMS template engine at src/Playsms/Tpl.php:_compile(). The vulnerability is triggered when an attacker supplied username with a malicious payload is submitted. This malicious payload is then stored in a TPL template which when rendered a second time, results in code execution. Full Article
ut Pandora FMS Ping Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:57:47 GMT This Metasploit module exploits a vulnerability found in Pandora FMS 7.0NG and lower. net_tools.php in Pandora FMS 7.0NG allows remote attackers to execute arbitrary OS commands. Full Article
ut ThinkPHP 5.0.23 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:47:20 GMT This Metasploit module exploits one of two PHP injection vulnerabilities in the ThinkPHP web framework to execute code as the web user. Versions up to and including 5.0.23 are exploitable, though 5.0.23 is vulnerable to a separate vulnerability. The module will automatically attempt to detect the version of the software. Tested against versions 5.0.20 and 5.0.23 as can be found on Vulhub. Full Article
ut Net Sleuths Spot Poker Site Cheat Code By packetstormsecurity.com Published On :: Wed, 24 Sep 2008 00:41:45 GMT Full Article gamble
ut Microsoft VSCode Python Extension Code Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:12:49 GMT Proof of concept exploit for a Microsoft VSCode python extension code execution vulnerability. Full Article
ut Hackers Put A Pirate Bay Ad On A Serbian Billboard By packetstormsecurity.com Published On :: Mon, 11 Mar 2013 14:50:13 GMT Full Article headline hacker riaa mpaa pirate
ut EFF Sues US Government Over DRM Constitutionality By packetstormsecurity.com Published On :: Fri, 22 Jul 2016 15:24:22 GMT Full Article headline government usa riaa mpaa
ut Win32/XP SP3 Shutdown Shellcode By packetstormsecurity.com Published On :: Mon, 02 May 2011 23:45:23 GMT 56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer. Full Article
ut CentOS Control Web Panel 0.9.8.836 Authentication Bypass By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:34:44 GMT CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. Full Article
ut CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:52:30 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. Full Article
ut Germany Rolls Out ePassport II - It's Fingerprinting Good! By packetstormsecurity.com Published On :: Thu, 01 Nov 2007 11:23:35 GMT Full Article germany passport
ut UK Electronic Passports Cloned Within Minutes By packetstormsecurity.com Published On :: Thu, 07 Aug 2008 22:39:58 GMT Full Article britain passport
ut South Africa Rolls Out Biometric Passports By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:29:31 GMT Full Article africa passport
ut TP-Link TL-WR849N 0.9.1 4.16 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:29:26 GMT TP-Link TL-WR849N version 0.9.1 4.16 suffers from a firmware upload authentication bypass vulnerability. Full Article
ut Intelbras Wireless N 150Mbps WRN240 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:33:24 GMT Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability. Full Article
ut Oce Colorwave 500 CSRF / XSS / Authentication Bypass By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 22:03:23 GMT Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities. Full Article
ut SITS:Vision 9.7.0 Authentication Bypass By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:33:29 GMT An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected. Full Article
ut Huawei HG630 2 Router Authentication Bypass By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 10:11:11 GMT Huawei HG630 2 Router suffers from an authentication bypass vulnerability. Full Article
ut QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
ut Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
ut ManageEngine DataSecurity Plus Authentication Bypass By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:50:07 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability. Full Article
ut Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
ut rConfig 3.9.4 searchField Remote Code Execution By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 14:30:26 GMT rConfig version 3.9.4 searchField unauthenticated remote root code execution exploit. Full Article
ut Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
ut Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
ut TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:58:49 GMT This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team. Full Article
ut Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
ut TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
ut SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
ut netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
ut Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
ut Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
ut Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:59 GMT Full Article headline flaw patch intel
ut Pirate Bay Founder In Solitary Confinement Without Warrant By packetstormsecurity.com Published On :: Thu, 12 Dec 2013 17:00:50 GMT Full Article headline government pirate sweden
ut The Pirate Bay Uses The Cloud To Stay Out Of Law Enforcement's Reach By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:35 GMT Full Article headline government riaa mpaa pirate
ut uTorrent Users Urged To Upgrade To Mitigate Hijacking Flaw By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 15:16:09 GMT Full Article headline flaw pirate
ut netkit-telnet 0.17 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:57:43 GMT netkit-telnet version 0.17 telnetd on Fedora 31 BraveStarr remote code execution exploit. Full Article
ut Linux futex+VFS Use-After-Free By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:14:36 GMT Linux futex+VFS suffers from an improper inode reference in get_futex_key() that causes a use-after-free if the superblock goes away. Full Article
ut Spying And Net Neutrality Dominate Debates In Brazil By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 13:55:02 GMT Full Article headline government cyberwar spyware brazil
ut Hackers Pop Brazil Newspapers To Root Home Routers By packetstormsecurity.com Published On :: Mon, 15 Sep 2014 14:15:02 GMT Full Article headline hacker brazil
ut WhatsApp Executives Come To Brazil To Avoid New Bans By packetstormsecurity.com Published On :: Mon, 05 Jun 2017 18:40:42 GMT Full Article headline government privacy facebook brazil cryptography
ut 100,000 Home Routers Recruited To Spread Brazilian Hacking Scam By packetstormsecurity.com Published On :: Tue, 02 Oct 2018 14:13:41 GMT Full Article headline hacker malware fraud brazil
ut Brazil Prosecutes Greenwald In Attack On Press Freedom By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:40 GMT Full Article headline government data loss brazil