This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team.
3dee135a8e106fdeab9e4abedc3fa3cc00c9a9cfec03ca0c69bd06e41cc64d93
This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1.
0a05b28933eea9b4fd536dc8f5ff0aa3f15ae34ce0529c5fa21139b75f041521
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
1858725fd6d04a1af3c2798c341529aa0d229e838b6476f036156dc5dd254aa1
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.
f38f25336cf59ecdf0ae3826982a6580ea53b056fb96d1430cf97645a8b1b560
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.
04559de3a99a7794cdf77c1a2271e10e664021df37e7e1c7dee00ae868b1fd1b
A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol.
6ed18788c9d0b689b962cf0717c7f1295a605925baa43166ab82599970c79913
In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.
6190a41a4bab66c3d432306ebf9e46df8ad7f570d30d1ad5540b36c9729f1aa1
Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.
698ed1c47976f1e2386429b605fead68fe0c4b0f58fb832281caf6e36f6add44
Ubuntu Security Notice 4330-1 - It was discovered that PHP incorrectly handled certain file uploads. An attacker could possibly use this issue to cause a crash. It was discovered that PHP incorrectly handled certain PHAR archive files. An attacker could possibly use this issue to access sensitive information. It was discovered that PHP incorrectly handled certain EXIF files. An attacker could possibly use this issue to access sensitive information or cause a crash. Various other issues were also addressed.
103beb00d1081229c9f84f14247061058d88af29920494f71828b3a45201dd63
AirDisk Pro version 5.5.3 for iOS suffers from multiple persistent cross site scripting vulnerabilities.
80a3b9a3db6d8fc016628c9f588bd883ee5669d8fa0d61e811f3702f92d1fbff
CA Technologies, A Broadcom Company, is alerting customers to multiple vulnerabilities in CA API Developer Portal. Multiple vulnerabilities exist that can allow attackers to bypass access controls, view or modify sensitive information, perform open redirect attacks, or elevate privileges. CA published solutions to address these vulnerabilities and recommends that all affected customers implement these solutions. Versions 4.2.x and below as well as 4.3.1 are affected.
6d265b473d801c6edbd64f1ac235a8448cf52134380927f18722ca0f0b0a1813
SeedDMS version 5.1.18 suffers from multiple persistent cross site scripting vulnerabilities.
24d0e288d33e4686a298c54b62106fb5218de9a7e54eae8881ac119195269122
Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities.
830adea4a46b19b7d99e5a5ff19bb92f4e37511a0ae79e180736f9e785ca9d19
File Transfer iFamily version 2.1 suffers from a directory traversal vulnerability.
4bf04bcca10c11698785238da55ecaec1c87a0a134328acbb6906da07747e043
SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability.
74a90908592ab249f26e0649d52acfdf8e9f288349f5b0bfacbd3d3d1cce218c
DedeCMS version 7.5 SP2 suffers from multiple persistent cross site scripting vulnerabilities.
54edea7c846dd37886b40e008e57075b475115e0a1d0a0a672a1676b8c865791
DedeCMS version 7.5 SP2 suffers from multiple cross site scripting vulnerabilities.
da9b6d2a4cd9525e151fa4cebcf6bbfbd15bb73992b783549f73c0578abbfe05
The Bundeswehr Karriere portal suffered from multiple cross site scripting vulnerabilities.
dcce4aa8f8bed5859f1835c7e594e92ebcbe484bf9058ec38bf5d90e319873ec
Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.
4158e88791985f3d3dd078ffcac3127a4c018eea63ca26585757d676111dae17
BlazeDVD version 7.0.2 SEH buffer overflow exploit.
458bdb812e346580302f2803dc6150cec0d03f02543f267c2a737ec811ee96c2
Pinger version 1.0 suffers from a remote code execution vulnerability.
6795ccd0c09fc4618c83bfae0365a849feb9837af233fd1b6f0c72a548b48bfe
SkyWrapper is a tool from CyberArk that helps to discover suspicious creation forms and uses of temporary tokens in AWS.
3c99b4b92aaa5694ff64770862851aa61ac43bff8ffc9cd17f47e6da96b7f001
Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). It was discovered that the KVM implementation in the Linux kernel, when paravirtual TLB flushes are enabled in guests, the hypervisor in some situations could miss deferred TLB flushes or otherwise mishandle them. An attacker in a guest VM could use this to expose sensitive information (read memory from another guest VM). Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory).
ca957b71b70ae09e8f907fcd801c5a9571b9a877407f563e8bd4dc3a7e21def9
Matrix42 Workspace Management version 9.1.2.2765 suffers from a persistent cross site scripting vulnerability.
4a0cd82d4796b2202c8acce87eaca6955b5d5822f55e7041b3601b17471ec7a9
Ubuntu Security Notice 4329-1 - Felix Wilhelm discovered that Git incorrectly handled certain URLs that included newlines. A remote attacker could possibly use this issue to trick Git into returning credential information for a wrong host.
c507f897a077e45f8e138f77a383e2e59f2ee92189aa4eff179d2ffee8fb105c