what you don't know can hurt you
Showing 1 - 25 of 1,962 RSS Feed

Spoof Files

ABUS Secvest Hybrid Module FUMO50110 Authentication Bypass
Posted Jul 31, 2020
Authored by Matthias Deeg, Thomas Detert, Michael Ruttgers

ABUS Secvest Hybrid module (FUMO50110) suffers an authentication bypass vulnerability. The hybrid module does not have any security mechanism that ensures confidentiality or integrity of RF packets that are exchanged between the ABUS Secvest alarm panel and the ABUS Secvest Hybrid module. Thus, an attacker can spoof messages of the ABUS Secvest Hybrid module based on sniffed status RF packets that are issued by the ABUS Secvest Hybrid module on a regularly basis (~2.5 minutes).

tags | advisory, spoof, bypass
advisories | CVE-2020-14158
MD5 | 164e9f6290e63311d3c3156fd7ad2815
UFONet 1.5
Posted Jun 8, 2020
Authored by psy | Site ufonet.03c8.net

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Changes: Various bug fixing and updates.
tags | tool, web, denial of service, spoof
systems | unix
MD5 | 3e301124ea57f3db26a5f9a966481f4d
Ubuntu Security Notice USN-4383-1
Posted Jun 5, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4383-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the addressbar, or execute arbitrary code. It was discovered that NSS showed timing differences when performing DSA signatures. An attacker could potentially exploit this to obtain private keys using a timing attack. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, spoof
systems | linux, ubuntu
advisories | CVE-2020-12399, CVE-2020-12407, CVE-2020-12408, CVE-2020-12411
MD5 | 7008565679641f0d4d2c4c80f6ec42cf
Crystal Shard http-protection 0.2.0 IP Spoofing Bypass
Posted May 29, 2020
Authored by Halis Duraki

Crystal Shard http-protection version 0.2.0 suffers from an IP spoofing bypass vulnerability.

tags | exploit, web, spoof, bypass
MD5 | 6d1cdc2247ff8ed8eefca89cf866d2cd
Ubuntu Security Notice USN-4373-1
Posted May 26, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4373-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. It was discovered that Thunderbird did not correctly handle Unicode whitespace characters within the From email header. An attacker could potentially exploit this to spoof the sender email address that Thunderbird displays.

tags | advisory, denial of service, arbitrary, spoof
systems | linux, ubuntu
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12397, CVE-2020-6831
MD5 | 48d9b8ae7ffedbd250b8387a84151b42
Ubuntu Security Notice USN-4353-2
Posted May 12, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4353-2 - USN-4353-1 fixed vulnerabilities in Firefox. The update caused a regression that impaired the functionality of some addons. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, spoof the URL bar, or execute arbitrary code.

tags | advisory, denial of service, arbitrary, spoof, vulnerability
systems | linux, ubuntu
advisories | CVE-2020-12392, CVE-2020-12394
MD5 | 3245c740a022b08af03b652a81194a54
Red Hat Security Advisory 2020-2054-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2054-01 - Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. This release of Open Liberty 20.0.0.5 serves as a replacement for Open Liberty 20.0.0.4 and includes security fixes, bug fixes, and enhancements. For specific information about this release, see links in the References section. Issues addressed include information leakage and spoofing vulnerabilities.

tags | advisory, java, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-4329, CVE-2020-4421
MD5 | 9012305fd3a682ecd827792eb468f906
Red Hat Security Advisory 2020-2050-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2050-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.8.0. Issues addressed include buffer overflow, spoofing, and use-after-free vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12395, CVE-2020-12397, CVE-2020-6831
MD5 | f0f509c8a98f1e75861b31968984da9f
Red Hat Security Advisory 2020-2049-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2049-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.8.0. Issues addressed include buffer overflow, spoofing, and use-after-free vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12395, CVE-2020-12397, CVE-2020-6831
MD5 | ae525081640b49f2af16d43b6181f1d0
Red Hat Security Advisory 2020-2046-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2046-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.8.0. Issues addressed include buffer overflow, spoofing, and use-after-free vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12395, CVE-2020-12397, CVE-2020-6831
MD5 | 3e4800352ed0aad7ce80437030bbc415
Red Hat Security Advisory 2020-2047-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2047-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.8.0. Issues addressed include buffer overflow, spoofing, and use-after-free vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12395, CVE-2020-12397, CVE-2020-6831
MD5 | 76812eb9d4e5beb44737115e4c7aef70
Red Hat Security Advisory 2020-2048-01
Posted May 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2048-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.8.0. Issues addressed include buffer overflow, spoofing, and use-after-free vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | linux, redhat
advisories | CVE-2020-12387, CVE-2020-12392, CVE-2020-12395, CVE-2020-12397, CVE-2020-6831
MD5 | 8e7056da973aa24d67c47a3ae5e0653a
Red Hat Security Advisory 2020-1600-01
Posted Apr 28, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1600-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Issues addressed include a spoofing vulnerability.

tags | advisory, spoof
systems | linux, redhat
advisories | CVE-2018-15587
MD5 | ee447e9682bd8a0914c76a6f8ca2f36c
Red Hat Security Advisory 2020-1080-01
Posted Mar 31, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1080-01 - Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Issues addressed include OpenPGP signature spoofing and certificate errors being ignored.

tags | advisory, spoof
systems | linux, redhat
advisories | CVE-2018-15587, CVE-2019-3890
MD5 | 5d279dd12e732119aa0950652fc2313f
Ubuntu Security Notice USN-4299-1
Posted Mar 12, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4299-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy protections, or execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, spoof
systems | linux, ubuntu
advisories | CVE-2019-20503, CVE-2020-6808, CVE-2020-6809, CVE-2020-6810, CVE-2020-6811, CVE-2020-6812, CVE-2020-6815
MD5 | 67cbdfdad2dfc914c5dc998ef6ee9902
Google Invisible RECAPTCHA 3 Spoof Bypass
Posted Feb 10, 2020
Authored by Matamorphosis

Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability.

tags | exploit, spoof, bypass
MD5 | 03e20cd2aa23071dfe0c93c4d8a7b255
UFONet 1.4
Posted Feb 7, 2020
Authored by psy | Site ufonet.03c8.net

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Changes: Ported to Python 3.x. Various bug fixing and updates. Various other updates.
tags | tool, web, denial of service, spoof
systems | unix
MD5 | e31177e7f9c739a115f003ef4f391543
Apple Security Advisory 2020-1-28-5
Posted Jan 29, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-1-28-5 - Safari 13.0.5 is now available and addresses address bar spoofing and password disclosure in transit issues.

tags | advisory, spoof
systems | apple
advisories | CVE-2020-3833, CVE-2020-3841
MD5 | cf62237f168cf7deb01854b6eb594a7d
CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept
Posted Jan 16, 2020
Authored by Kudelski Security

This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.

tags | exploit, spoof, proof of concept
systems | windows
advisories | CVE-2020-0601
MD5 | d2c133f541a9d87a0a3240f578df147d
Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing
Posted Dec 12, 2019
Authored by David Haintz | Site sec-consult.com

Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability.

tags | exploit, spoof
systems | windows
MD5 | bf4d6995971178b6b1ea80749698ee1f
Ubuntu Security Notice USN-4202-2
Posted Dec 10, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4202-2 - USN-4202-1 fixed vulnerabilities in Thunderbird. After upgrading, Thunderbird created a new profile for some users. This update fixes the problem. It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code.

tags | advisory, denial of service, overflow, arbitrary, spoof, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2019-11755, CVE-2019-11761, CVE-2019-15903
MD5 | 9fff7c893619a32a00e008fd58151899
Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation
Posted Oct 1, 2019
Authored by Andrew Klaus

A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected.

tags | exploit, web, root, spoof, tcp
MD5 | ee1a1fa2b58f6637bd250813eb471ce4
Apple Security Advisory 2019-9-26-9
Posted Sep 29, 2019
Authored by Apple | Site apple.com

Apple Security Advisory 2019-9-26-9 - Safari 13.0.1 addresses user interface spoofing and browser history leakage vulnerabilities.

tags | advisory, spoof, vulnerability
systems | apple
advisories | CVE-2019-8654, CVE-2019-8725
MD5 | 391e341bfa1cc6482ebc52fb1b742723
Debian Security Advisory 4524-1
Posted Sep 17, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4524-1 - Multiple vulnerabilities have been discovered in the Dino XMPP client, which could allow spoofing message, manipulation of a user's roster (contact list) and unauthorised sending of message carbons.

tags | advisory, spoof, vulnerability
systems | linux, debian
advisories | CVE-2019-16235, CVE-2019-16236, CVE-2019-16237
MD5 | 385d667cf9db801e7e92a0c327da4fcd
Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests
Posted Aug 30, 2019
Authored by T. Weber | Site sec-consult.com

Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall.

tags | exploit, spoof
MD5 | 0939a6e730c410be2d31a0edca0b654c
Page 1 of 79
Back12345Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close