Monthly Archives: April 2016
Anonymous Group Takes Down KKK Website
Spotify Denies Hack After Users' Personal Data Shows Up On Pastebin
Ansvif 1.4.1
Ansvif is “A Not So Very Intelligent Fuzzer”. It feeds garbage arguments and data into programs trying to induce a fault.
Pcapteller 1.1
Pcapteller is a tool designed for simple traffic manipulation and replay. The tool allows you to recreate a recorded network traffic scenario that occurred in a foreign network, as it really happened in yours. Basically, the tool reads network packets from a PCAP file, and it replaces a given IP address with one that fits your needs. Afterwards, the manipulated packets are injected into the network. The tool is useful if you want to recreate scenarios where computer attacks or malware infections occurred. Using such scenarios as a base, Pcapteller will make it look like everything is really happening in your network. Pcapteller can help you improving your blue team’s network security monitoring skills, or creating network decoys during red team operations.
Trend Micro (Account) – Email Spoofing Web Vulnerability
Posted by Vulnerability Lab on Apr 26
Document Title:
===============
Trend Micro (Account) – Email Spoofing Web Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1693
Trend Micro ID: 1-1-1035655030
Release Date:
=============
2016-04-25
Vulnerability Laboratory ID (VL-ID):
====================================
1693
Common Vulnerability Scoring System:
====================================
4.6
Product & Service…
VoipNow v4.0.1 – (xajax_handler) Persistent Vulnerability
Posted by Vulnerability Lab on Apr 26
Document Title:
===============
VoipNow v4.0.1 – (xajax_handler) Persistent Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1828
Release Date:
=============
2016-04-26
Vulnerability Laboratory ID (VL-ID):
====================================
1828
Common Vulnerability Scoring System:
====================================
3.8
Product & Service Introduction:…
Gemtek CPE7000 WLTCS-106 sysconf.cgi Remote Command Execution
A vulnerability exists for Gemtek CPE7000 model ID WLTCS-106 exposing Iperf tool to unauthenticated users. Injecting a command in the perf_measure_server_ip parameter, an attacker can execute arbitrary commands. Since the service runs as root, the remote command execution has the same administrative privileges. The remote shell is obtained uploading the payload and executing it. A reverse shell is preferred rather then a bind one, since firewall won’t allow (by default) incoming connections. Tested on Hardware version V02A and Firmware version 01.01.02.082.
Gemtek CPE7000 WLTCS-106 Administrator SID Retriever
A vulnerability exists for Gemtek CPE7000 model ID WLTCS-106 which allows unauthenticated remote attackers to retrieve a valid Administrative SID.
HP Security Bulletin HPSBGN03582 1
HP Security Bulletin HPSBGN03582 1 – HPE Helion CloudSystem addressed stack based buffer overflows in glibc’s implementation of getaddrinfo(). These vulnerabilities could be remotely exploited to cause a Denial of Service (DoS) or allow execution of arbitrary code on the host with the permissions of a user running glibc library. Revision 1 of this advisory.