co Danger Worm Hijacks Facebook Accounts To Inject Banking Trojan By packetstormsecurity.com Published On :: Tue, 29 Nov 2011 16:49:19 GMT Full Article headline bank trojan worm facebook
co Massive Cyber-Attack Discovered, Researchers Say By packetstormsecurity.com Published On :: Tue, 29 May 2012 15:19:27 GMT Full Article headline hacker malware israel worm iran
co Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
co Windows Media Services ConnectFunnel Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 19 Apr 2010 22:46:07 GMT This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts. Full Article
co Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
co Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
co Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
co 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
co Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
co ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
co Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
co How Conficker Makes Use Of MS08-067 By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:06:50 GMT Whitepaper called How Conficker makes use of MS08-067. Full Article
co PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
co Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
co Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
co Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
co Advertiser Settles Charges For Use Of Adobe Flash Cookies By packetstormsecurity.com Published On :: Wed, 09 Nov 2011 00:53:12 GMT Full Article headline adobe cookiejacking
co Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
co Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
co Opera Says Bug Probably Can't Commandeer Machines By packetstormsecurity.com Published On :: Fri, 05 Mar 2010 22:35:14 GMT Full Article opera
co Opera Just Added A Bitcoin-Mining Blocker By packetstormsecurity.com Published On :: Fri, 22 Dec 2017 16:12:26 GMT Full Article headline opera
co 10code.tgz By packetstormsecurity.com Published On :: Wed, 01 Sep 1999 15:25:28 GMT 10xxx Phone Code Lookup (no 10-10-xxx yet). From Attrition Full Article
co areacode.tgz By packetstormsecurity.com Published On :: Tue, 21 Sep 1999 18:25:58 GMT Area code lookup program. From Attrition Full Article
co CIA Contractor Released After Pakistan Killings By packetstormsecurity.com Published On :: Wed, 16 Mar 2011 14:21:32 GMT Full Article headline government usa pakistan cia
co Kim Dotcom Sues New Zealand Government For Damages By packetstormsecurity.com Published On :: Mon, 22 Jan 2018 15:03:58 GMT Full Article headline government fraud mpaa new zealand
co Kim Dotcom Loses Latest Appeal Against US Extradition By packetstormsecurity.com Published On :: Thu, 05 Jul 2018 16:09:00 GMT Full Article headline government usa fraud mpaa new zealand
co Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
co Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
co Teen Drops $33K On Wikileaks Server Using Dad's Ebay Account By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 02:17:27 GMT Full Article headline data loss ebay sweden
co eBay Under Pressure As Hacks Continue By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:27 GMT Full Article headline hacker data loss ebay
co Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
co Data Easily Recovered From eBayed Smartphones, Disks By packetstormsecurity.com Published On :: Thu, 08 Oct 2015 00:35:15 GMT Full Article headline privacy phone data loss google ebay apple
co Privacy Concerns Over Gaps In eBay Crypto By packetstormsecurity.com Published On :: Thu, 23 Feb 2017 16:39:56 GMT Full Article headline privacy flaw ebay cryptography
co The Three Amigos Offer Sanctuary To Cornered NSA Leaker Snowden By packetstormsecurity.com Published On :: Mon, 08 Jul 2013 15:10:18 GMT Full Article headline government privacy usa data loss spyware venezuela nsa
co Mozilla Offers $10k To Avoid Heartbleed Style Code Errors By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:31 GMT Full Article headline hacker bank flaw ssl mozilla cryptography
co Heartbleed Used To Uncover Data From Cyber-Criminals By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 23:43:22 GMT Full Article headline cybercrime data loss fraud flaw ssl cryptography
co Many Sites Reusing Heartbleed Compromised Private Keys By packetstormsecurity.com Published On :: Fri, 09 May 2014 23:22:10 GMT Full Article headline privacy data loss flaw ssl cryptography
co EFF Sues NSA For Heartbleed Records By packetstormsecurity.com Published On :: Sun, 06 Jul 2014 19:02:39 GMT Full Article headline government privacy usa flaw ssl nsa cryptography
co Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
co IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
co Jury Scrutinizes DMCA in ElcomSoft Case By packetstormsecurity.com Published On :: Mon, 16 Dec 2002 04:01:13 GMT Full Article government dmca
co Elcomsoft Verdict Weakens the DMCA By packetstormsecurity.com Published On :: Wed, 18 Dec 2002 21:26:29 GMT Full Article dmca
co Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
co Court Confirms DMCA Good Faith Web Site Shut Down By packetstormsecurity.com Published On :: Fri, 30 May 2003 17:16:09 GMT Full Article government dmca
co Jury Convicts DirecTV Pirate On DMCA Charges By packetstormsecurity.com Published On :: Tue, 23 Sep 2003 14:42:48 GMT Full Article government dmca
co Court Adds New DMCA Exceptions By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 02:40:24 GMT Full Article government dmca
co Diebold Uses DMCA to Conceal E-Voting Machine Flaws By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 22:45:15 GMT Full Article government flaw dmca
co US Congress Readies Super DMCA By packetstormsecurity.com Published On :: Tue, 25 Apr 2006 15:06:54 GMT Full Article government usa dmca
co Coupon Hacker Faces DMCA Lawsuit By packetstormsecurity.com Published On :: Mon, 20 Aug 2007 09:50:29 GMT Full Article hacker government dmca
co Coupons, Inc. Drops DMCA Lawsuit Against Coupon Hacker By packetstormsecurity.com Published On :: Fri, 21 Nov 2008 05:21:08 GMT Full Article hacker government dmca