[FD] NEW VMSA-2016-0016 - vRealize Operations (vROps) updates address privilege escalation vulnerability

2016-10-11 Thread VMware Security Response Center
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- - --- VMware Security Advisory Advisory ID: VMSA-2016-0016 Severity:Critical Synopsis:vRealize Operations (vROps) updates address

[FD] Onapsis Security Advisory ONAPSIS-2016-057: Oracle E-Business Suite Cross Site Scripting (XSS)

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-057: Oracle E-Business Suite Cross Site Scripting (XSS) 1. Impact on Business = By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Risk

[FD] Onapsis Security Advisory ONAPSIS-2016-056: Oracle E-Business Suite Cross Site Scripting (XSS)

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-056: Oracle E-Business Suite Cross Site Scripting (XSS) 1. Impact on Business = By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Risk

[FD] Onapsis Security Advisory ONAPSIS-2016-055: Oracle E-Business Suite Cross Site Scripting (XSS)

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-055: Oracle E-Business Suite Cross Site Scripting (XSS) 1. Impact on Business = By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Risk

[FD] Onapsis Security Advisory ONAPSIS-2016-053: Oracle E-Business Suite Cross Site Scripting (XSS)

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-053: Oracle E-Business Suite Cross Site Scripting (XSS) 1. Impact on Business = By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Risk

[FD] Onapsis Security Advisory ONAPSIS-2016-052: Oracle E-Business Suite Cross Site Scripting (XSS)

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-052: Oracle E-Business Suite Cross Site Scripting (XSS) 1. Impact on Business = By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system. Risk

[FD] Onapsis Security Advisory ONAPSIS-2016-051: SAP Business Objects Memory Corruption

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-051: SAP Business Objects Memory Corruption 1. Impact on Business = By exploiting this vulnerability an attacker could hide audit information logged by the SAP system. Risk Level: Low 2. Advisory Information === -

[FD] Onapsis Security Advisory ONAPSIS-2016-005: SAP SLDREG memory corruption

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-005: SAP SLDREG memory corruption 1. Impact on Business = By exploiting this vulnerability, an attacker could potentially abuse of technical functions to access and/or compromise the business information. Risk Level: Low 2. Advisory

[FD] Onapsis Security Advisory ONAPSIS-2016-050: SAP OS Command Injection in SCTC_REFRESH_CONFIG_CTC

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-050: SAP OS Command Injection in SCTC_REFRESH_CONFIG_CTC 1. Impact on Business = By exploiting this vulnerability an authenticated user will be able to take full control of the system. Risk Level: Critical 2. Advisory Information

[FD] Onapsis Security Advisory ONAPSIS-2016-049: SAP OS Command Injection in SCTC_REORG_SPOOL

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-049: SAP OS Command Injection in SCTC_REORG_SPOOL 1. Impact on Business = By exploiting this vulnerability an authenticated user will be able to take full control of the system. Risk Level: Critical 2. Advisory Information

[FD] Onapsis Security Advisory ONAPSIS-2016-002: SAP UCON Security Protection bypass

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-002: SAP UCON Security Protection bypass 1. Impact on Business = By exploiting this vulnerability, an attacker could bypass protections implemented in the SAP systems, potentially executing arbitrary business processes. Risk Level:

Re: [FD] Critical Vulnerability in Ubiquiti UniFi

2016-10-11 Thread Rob Thomas
The impression I get from Tim Pham's emails is that the 'Unify Manager' is doing some behind-the-scenes tunnelling, and bringing the Mongo interface from the server to the client (Eg, Mac or Windows device) and you are then able to connect to localhost (on the client) which tunnels through to

[FD] Billion Router 7700NR4 Remote Root Command Execution

2016-10-11 Thread Rio Sherri
# Title : Billion Router 7700NR4 Remote Root Command Execution # Date : 06/10/2016 # Author : R-73eN # Tested on: Billion Router 7700NR4 # Vendor : http://www.billion.com/ # Vulnerability Description: # This router is a widely used here in Albania. It is given by a telecom provider to the home and

[FD] BFS-SA-2016-004: LG PC Suite Insecure Update Mechanism

2016-10-11 Thread Blue Frost Security Research Lab
___ Vendor: LG, www.lg.com Affected Products: LG PC Suite for Windows Affected Version: <= 5.3.25.20150529 (Build 18212) Severity: High OVE ID: OVE-20161010-0007

[FD] [SECURITY] CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow

2016-10-11 Thread Mark Thomas
CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: - Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.41 Description The IIS/ISAPI specific code implements special handling when a virtual host is present. The

[FD] [SYSS-2016-043] Microsoft Wireless Desktop 2000 - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
Advisory ID: SYSS-2016-043 Product: Microsoft Wireless Desktop 2000 Manufacturer: Microsoft Affected Version(s): Ver. A Tested Version(s): Ver. A Vulnerability Type: Cryptographic Issues (CWE-310) Insufficient Protection against Replay Attacks Risk Level: Medium Solution

[FD] [SYSS-2016-068] Fujitsu Wireless Keyboard Set LX901 - Cryptographic Issues (CWE-310), Missing Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
Advisory ID: SYSS-2016-068 Product: Wireless Keyboard Set LX901 Manufacturer: Fujitsu Affected Version(s): Model No. GK900 Tested Version(s): Model No. GK900 Vulnerability Type: Cryptographic Issues (CWE-310) Missing Protection against Replay Attacks Risk Level: Medium Solution

[FD] [SYSS-2016-043] Microsoft Wireless Desktop 2000 - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Advisory ID: SYSS-2016-043 Product: Microsoft Wireless Desktop 2000 Manufacturer: Microsoft Affected Version(s): Ver. A Tested Version(s): Ver. A Vulnerability Type: Cryptographic Issues (CWE-310) Insufficient Protection against

[FD] [SYSS-2016-033] Microsoft Wireless Desktop 2000 - Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)

2016-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Advisory ID: SYSS-2016-033 Product: Microsoft Wireless Desktop 2000 Manufacturer: Microsoft Affected Version(s): Ver. A Tested Version(s): Ver. A Vulnerability Type: Insufficient Protection of Code (Firmware) and Data

Re: [FD] IE11 is not following CORS specification for local files

2016-10-11 Thread Ricardo Iramar dos Santos
I did a small improvement in this attack. Using IE File API (https://msdn.microsoft.com/en-us/library/hh772315(v=vs.85).aspx) an attacker would be able to create a web page with the content below and send to a victim. A local file with the same content that I sent previously would be created on

[FD] Crashing Android devices with large Assisted-GPS Data Files [CVE-2016-5348]

2016-10-11 Thread Nightwatch Cybersecurity Research
Original at: https://wwws.nightwatchcybersecurity.com/2016/10/04/advisory-cve-2016-5348-2/ Summary Android devices can be crashed remotely forcing a halt and then a soft reboot by a MITM attacker manipulating assisted GPS/GNSS data provided by Qualcomm. This issue affects the open source code in

[FD] [SEARCH-LAB advisory] AVTECH IP Camera, NVR, DVR multiple vulnerabilities

2016-10-11 Thread Gergely Eberhardt
Avtech devices multiple vulnerabilities -- Platforms / Firmware confirmed affected: - Every Avtech device (IP camera, NVR, DVR) and firmware version. [4] contains the list of confirmed firmware versions, which are affected. - Product page:

[FD] CVE-2016-5425 - Apache Tomcat packaging on RedHat-based distros - Root Privilege Escalation (affecting CentOS, Fedora, OracleLinux, RedHat etc.)

2016-10-11 Thread Dawid Golunski
Vulnerability: Apache Tomcat packaging on RedHat-based distros CVE-2016-5425 Discovered by: Dawid Golunski (http://legalhackers.com) Affected systems: Multiple Tomcat packages on RedHat-based systems including: CentOS,Fedora,OracleLinux,RedHat etc. Short Description: Apache Tomcat packages

[FD] Contenido v4.9.11 CMS - (Backend) Multiple XSS Vulnerabilities

2016-10-11 Thread ad...@evolution-sec.com
Document Title: === Contenido v4.9.11 CMS - (Backend) Multiple XSS Vulnerabilities References (Source): http://www.vulnerability-lab.com/get_content.php?id=1928 Release Date: = 2016-10-10 Vulnerability Laboratory ID (VL-ID):

[FD] Onapsis Security Advisory ONAPSIS-2016-048: SAP OS Command Injection in SCTC_TMS_MAINTAIN_ALOG

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-048: SAP OS Command Injection in SCTC_TMS_MAINTAIN_ALOG 1. Impact on Business = By exploiting this vulnerability an authenticated user will be able to take full control of the system. Risk Level: Critical 2. Advisory Information

[FD] Onapsis Security Advisory ONAPSIS-2016-029: SAP Missing Signature Check in DSA Algorithm

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-029: SAP Missing Signature Check in DSA Algorithm 1. Impact on Business = By exploiting this vulnerability an attacker could impersonated as another person. Risk Level: Medium 2. Advisory Information === - Public

[FD] Onapsis Security Advisory ONAPSIS-2016-001: SAP console insecure password storage

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-001: SAP console insecure password storage 1. Impact on Business = By exploiting this vulnerability, an attacker could obtain access to additional SAP systems, potentially compromising these systems as well as the information stored

[FD] Onapsis Security Advisory ONAPSIS-2016-046: SAP OS Command Injection in SCTC_REFRESH_IMPORT_USR_CLNT

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-046: SAP OS Command Injection in SCTC_REFRESH_IMPORT_USR_CLNT 1. Impact on Business = By exploiting this vulnerability an authenticated user will be able to take full control of the system. Risk Level: Critical 2. Advisory Information

[FD] Onapsis Security Advisory ONAPSIS-2016-044: SAP OS Command Injection in PREPARE_CHECK_CAPACITY

2016-10-11 Thread Onapsis Research
Onapsis Security Advisory ONAPSIS-2016-044: SAP OS Command Injection in PREPARE_CHECK_CAPACITY 1. Impact on Business = By exploiting this vulnerability an authenticated user will be able to take full control of the system. Risk Level: Critical 2. Advisory Information