SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.
60697146d0a70dbebb7b71b62525ad2bfd1bd34434c72a0d25e3d226e5e4ebc6
RedTeam Pentesting discovered that the shibd service of Shibboleth 2 does not extract SAML attribute values in a robust manner. By inserting XML entities into a SAML response, attackers may truncate attribute values without breaking the document's signature. This might lead to a complete bypass of authorisation mechanisms. Versions prior to 2.6.1 are affected.
3161025b44bdf506c94fc43a995ecee6fe36a5a17cca6bee9d2de7e64bc0814f
D-Link DNS-325 ShareCenter versions 1.05B03 and below suffer from remote shell upload and command injection vulnerabilities.
1d616d13ec26238dd932f3e0e6c63790101f854e43be4a7b9cc005eb538134a7
D-Link DNS-343 ShareCenter versions 1.05 and below suffer from a remote command injection vulnerability.
d832c2d9c95f21a1c3cb7649d5a90e5a9d834f91134ce4a5797f72a044e07fe9
Seagate Media Server on a Seagate Personal Cloud model SRN21C running firmware version 4.3.16.0 suffers from an unauthenticated arbitrary file and folder deletion vulnerability.
f3f389a36fe31dac25043a5e92d7942a029fddff9e00419ed4f652efc9e5e14c
Oracle PeopleSoft version 8.5x suffers from a remote code execution vulnerability.
656a40131f4c856c17aef7ac78ea99f8fbbc7bcb6a234a9ab725ec1ef9b81d37
Domains and Hostings Manager PRO version 3.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2761e26ece8c4e2a7c9239cc85b76d9bac3c7cc3e355bd1097bf45ff8c02149b
VTech DigiGo with firmware 83.60630 suffers from a browser overlay attack vulnerability.
a08bb9d4f448fbb6f9f63a559f19f3797bec827496e85a2dc0d075a49501d4fe
pfSense versions 2.1.3 and below suffer from a status_rrd_graph_img.php command injection vulnerability.
bf26b4b42edea51cce31d1bd75bc0b53928c38a40b474f5aaf67bc12917e8a4e
Kaseya VSA version 9.2 suffers from an authentication bypass vulnerability.
e785da11616e7a87313aa682bf3a5d5846991c50c08eb3af26d282128488274b
ImgHosting version 1.5 suffers from a cross site scripting vulnerability.
0ac4994f7565ff76ee339941991704eb09c33de5e60171e2c98b0bf6a8f0cc83
Kaseya VSA version 9.2 suffers from a remote shell upload vulnerability.
3194d2bc7ec7bf4ca1d8cc6d614abed584d5a7059e33e7ada477b3d959687b05
PerfexCRM version 1.9.7 suffers from an arbitrary file upload vulnerability.
f2611cb6d6f0ec4587c02a9fd5731ac7d6491dc27930498b25b55a34b9d4940d
RISE version 1.9 suffers from a remote SQL injection vulnerability.
25874188cc206f810cd990dcdd6a5299345a917a7b66e4ca4ec24cf0078111ca
Disk Pulse Enterprise version 10.1.18 buffer overflow exploit that binds a shell.
06882870395e26f373aefe6fdfea46528578d60dcdde572d1661a9bd7d49ca5a
SysGauge Server version 3.6.18 suffers from a buffer overflow vulnerability.
46cb809d9536b498b333ddc1918802d2e9ea835dc88358d86b506e182ed4d6e9
ILIAS CMS versions 5.2.3 and below suffer from a cross site scripting vulnerability.
72bb2bfb5f7c9ef7545415d425d3b8463872e27f11a8fcbec3f1071556d3f942
Debian Linux Security Advisory 4086-1 - Nick Wellnhofer discovered that certain function calls inside XPath predicates can lead to use-after-free and double-free errors when executed by libxml2's XPath engine via an XSLT transformation.
c9350e61620a42729e564c1f542c28ca1791cd838a58a1978f932f188025a3f5
Debian Linux Security Advisory 4087-1 - Tavis Ormandy discovered a vulnerability in the Transmission BitTorrent client; insecure RPC handling between the Transmission daemon and the client interface(s) may result in the execution of arbitrary code if a user visits a malicious website while Transmission is running.
f4c5756d3ad8cdf7a3af937cb692a5d0522926e1e8656bed9f64546db645e214
Gentoo Linux Security Advisory 201801-15 - Multiple vulnerabilities have been found in PolarSSL, the worst of which may allow remote attackers to execute arbitrary code. Versions less than 1.3.9-r1 are affected.
13cbb4fca45633fc31a765b55660667646c8d6bbf8070320c66953de960385d1
Gentoo Linux Security Advisory 201801-14 - Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation. Versions less than 4.9.1-r1 are affected.
4dec006ba634428eb76045f55ebf29bfd247c42fd887dbfcf3f1ee8fa48ced86
The process of setting up and using dnscat2 is documented in this article. The tool consists of a Ruby server and a small C client, and can be used to quickly establish an encrypted covert channel between two computers over the Internet using DNS traffic. Once set up, the tool is evaluated by exfiltrating data out of a network that has a pfSense firewall at the perimeter blocking direct outbound DNS requests from client machines, and also running the Snort IDS. It is is seen that a reverse shell is successfully sent out of the network and no IDS alerts are generated.
4238ee78d79a92d53a74e413f3b6b4a75832717841a62f159d535e7323fd9e66
VTech DigiGo with firmware version 83.60630 fails to perform validation of TLS certificates.
f9da9299e285b5c8f647f4ba06b7a3c22775d378407e62fae4db31ce2e6430e4
A security vulnerability was found in Kaseya VSA file download file functionality. Using this vulnerability an authenticated user in a Kaseya VSA environment is able to download arbitrary files from the server (including source code of Kaseya, the database backups, configuration files, and even windows files). Version R9.2 was found affected.
a9945cf5a3532305e46699a157c53b03bab386f744bdea713fee52330aadad85
Adminer versions 4.3.1 and below suffer from a server-side request forgery vulnerability.
6f1cda8a60924a150f5dd1df915daa581c384cf22f8e66349e29e7b00deb3434