ir BoltWire 6.03 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:32:12 GMT BoltWire version 6.03 suffers from a local file inclusion vulnerability. Full Article
ir Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
ir Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
ir Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
ir Xinfire TV Player 6.0.1.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:16:03 GMT This Metasploit module exploits a buffer overflow in Xinfire TV Player Pro and Standard version 6.0.1.2. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as Aviosoft Digital TV Player and BlazeVideo HDTV Player. Full Article
ir Xinfire DVD Player 5.5.0.0 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:17:01 GMT This Metasploit module exploits a buffer overflow in Xinfire DVD Player Pro and Standard version 5.5.0.0. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as DVD X Player and BlazeDVD. Full Article
ir Ubisoft Sues Operators Of Four DDoS For Hire Services By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:44:56 GMT Full Article headline denial of service
ir Jira 8.3.4 Information Disclosure By packetstormsecurity.com Published On :: Sun, 02 Feb 2020 09:32:22 GMT Jira version 8.3.4 suffers from a username enumeration information disclosure vulnerability. Full Article
ir Verodin Director Web Console 3.5.4.0 Password Disclosure By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:46:01 GMT Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit. Full Article
ir Cisco UCS Director Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:11:07 GMT The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products. Full Article
ir Cisco M1070 Content Security Management Appliance IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:35:49 GMT Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit. Full Article
ir Cisco C170 Email Security Appliance 10.0.3-003 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:37:13 GMT Cisco C170 Email Security Appliance version 10.0.3-003 IronPort remote host header injection exploit. Full Article
ir Cisco Email Security Virtual Appliance C100V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:03 GMT Cisco Email Security Virtual Appliance C100V IronPort remote host header injection exploit. Full Article
ir Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:48 GMT Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit. Full Article
ir Cisco Email Security Virtual Appliance C600V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:02 GMT Cisco Email Security Virtual Appliance C600V IronPort remote host header injection exploit. Full Article
ir Cisco Email Security Virtual Appliance C370 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:50 GMT Cisco Email Security Virtual Appliance C370 IronPort remote host header injection exploit. Full Article
ir Cisco IronPort C350 Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:45:50 GMT Cisco IronPort C350 remote host header injection exploit. Full Article
ir Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:09:14 GMT Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit. Full Article
ir Cisco Email Security Virtual Appliance C300V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:10:34 GMT Cisco Email Security Virtual Appliance C300V IronPort remote host header injection exploit. Full Article
ir Cisco Email Security Virtual Appliance C380 IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:11:18 GMT Cisco Email Security Virtual Appliance C380 IronPort remote host header injection exploit. Full Article
ir Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
ir irix6local.txt By packetstormsecurity.com Published On :: Sun, 12 Mar 2006 22:05:39 GMT SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx. Full Article
ir IRIX-p_sh-asm.c By packetstormsecurity.com Published On :: Thu, 14 Jun 2007 05:16:30 GMT IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m. Full Article
ir Irix LPD tagprinter Command Execution By packetstormsecurity.com Published On :: Tue, 27 Oct 2009 16:00:56 GMT This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Full Article
ir Firewall Log Watch 1.2 By packetstormsecurity.com Published On :: Mon, 11 Oct 2010 05:29:32 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
ir IRIX Local Kernel Memory Disclosure / Denial Of Service By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 03:03:03 GMT IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities. Full Article
ir Firewall Log Watch 1.3 By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 05:42:24 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
ir Firewall Log Watch 1.4 By packetstormsecurity.com Published On :: Tue, 28 May 2013 12:22:44 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
ir SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation By packetstormsecurity.com Published On :: Sun, 28 Apr 2019 19:57:38 GMT SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit. Full Article
ir Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:49 GMT Full Article headline hacker flaw
ir Fake Coronavirus Emails Impersonate The WHO By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:27 GMT Full Article headline malware virus trojan fraud
ir Russian State Hackers Behind San Francisco Airport Hack By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:33:09 GMT Full Article headline government malware russia cyberwar
ir Phishing Emails Spoof WebEx Invites, Abuse Open Redirect By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:24 GMT Full Article headline fraud flaw cisco phish
ir Coronavirus: How Hackers Are Preying On Fears Of Covid-19 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:24 GMT Full Article headline hacker virus phish
ir Coronavirus-Themed Phishing Attacks And Hacking Campaigns Are On The Rise By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:57 GMT Full Article headline hacker government virus fraud phish
ir Northern Ireland DFP Rapped Over Data Loss By packetstormsecurity.com Published On :: Tue, 22 Dec 2009 02:55:40 GMT Full Article data loss ireland
ir Windows Scammers Threaten To Blow Up Irish Garda Station By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:20:49 GMT Full Article headline microsoft scam ireland terror
ir Irish Data Protection Authority Rules On Facebook By packetstormsecurity.com Published On :: Thu, 22 Dec 2011 19:57:14 GMT Full Article headline privacy facebook social ireland
ir Ireland Passes SOPA-Like Anti-Piracy Legislation Despite Protests By packetstormsecurity.com Published On :: Thu, 01 Mar 2012 16:22:30 GMT Full Article headline government riaa mpaa pirate ireland
ir Facebook Updates Data Use Policy To Appease Irish Government By packetstormsecurity.com Published On :: Mon, 14 May 2012 15:19:22 GMT Full Article headline government privacy facebook social ireland
ir First Irish-Speaking Virus Holds Bloke's Computer To Ransom By packetstormsecurity.com Published On :: Sat, 08 Sep 2012 00:36:18 GMT Full Article headline malware virus cybercrime fraud ireland
ir Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
ir Irish Data Watchdog Is Probing Facebook Transfers To US By packetstormsecurity.com Published On :: Tue, 20 Oct 2015 15:43:57 GMT Full Article headline government privacy usa data loss facebook social ireland
ir Irish Broadband Provider Bluebox Hacked By packetstormsecurity.com Published On :: Mon, 30 Nov 2015 17:01:14 GMT Full Article headline hacker privacy data loss ireland
ir DDoS Attack Disrupts Ireland's National Lottery By packetstormsecurity.com Published On :: Thu, 21 Jan 2016 14:42:09 GMT Full Article headline denial of service ireland
ir US Government To Defend Surveillance Activities In Irish Courts By packetstormsecurity.com Published On :: Mon, 13 Jun 2016 15:11:00 GMT Full Article headline government privacy usa facebook ireland
ir Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
ir Web-Based Firewall Logging Tool 1.1.0 By packetstormsecurity.com Published On :: Sat, 06 Aug 2016 18:50:51 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
ir FireHOL 3.0.2 By packetstormsecurity.com Published On :: Wed, 23 Nov 2016 15:38:11 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.0 By packetstormsecurity.com Published On :: Tue, 29 Nov 2016 18:53:55 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article