The ZKBioSecurity solution suffers from a use of hard-coded credentials. The application comes bundled with a pre-configured apache tomcat server and an exposed ‘manager’ application that after authenticating with the credentials: username: zkteco, password: zkt123, located in tomcat-users.xml file, it allows malicious WAR archive containing a JSP application to be uploaded, thus giving the attacker the ability to execute arbitrary code with SYSTEM privileges. Version 3.0.1.0_R_230 is affected.
Monthly Archives: August 2016
ZKTeco ZKAccess Professional 3.5.3 Insecure File Permissions
ZKAccess suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘M’ flag (Modify) for ‘Authenticated Users’ group. Version 3.5.3 is affected.
ZKTeco ZKTime.Net 3.0.1.6 Insecure File Permissions
ZKTime.Net suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘C’ flag (Change) for ‘Everyone’ group, making the entire directory ‘ZKTimeNet3.0’ and its files and sub-dirs world-writable. Version 3.0.1.6 is affected.
HP Security Bulletin HPSBGN03637 1
HP Security Bulletin HPSBGN03637 1 – A potential vulnerability has been identified in the AdminUI of the HP Operations Manager for Unix, Solaris, and Linux. The vulnerability could be exploited remotely resulting in Cross-Site Scripting (XSS). Revision 1 of this advisory.
Red Hat Security Advisory 2016-1781-01
Red Hat Security Advisory 2016-1781-01 – PostgreSQL is an advanced object-relational database management system. The following packages have been upgraded to a newer upstream version: rh-postgresql94-postgresql. Security Fix: A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code.
More Banks Plundered Through SWIFT Attacks
Malware-Ridden Word Docs Lead To Microsoft Alert Blurt
Sri Lankan Teen Hacks President's Website To Delay Exams
Dropbox Hackers Stole E-Mail Addresses, Hashed Passwords From 68M Accounts
Executable installers are vulnerable^WEVIL (case 40): Aviras' full package installers allow escalation of privilege
Posted by Stefan Kanthak on Aug 31
Hi @ll,
Avira’s free antivirus full package executable installers,
avira_antivirus_en-us.exe, avira_antivirus_de-de.exe etc.,
available from
<https://www.avira.com/en/download/product/avira-free-antivirus>,
<https://www.avira.com/de/download/product/avira-free-antivirus>
etc., have multiple vulnerabilities:
1. the full package executable installers (really: self-
extracting RAR archives) extract their payload (the real…