io Sweden Is Dropping Its Rape Investigation Into Assange By packetstormsecurity.com Published On :: Fri, 19 May 2017 13:49:30 GMT Full Article headline government britain data loss sweden
io Microsoft Buys Nokia For $7 Billion By packetstormsecurity.com Published On :: Tue, 03 Sep 2013 15:26:48 GMT Full Article headline microsoft phone nokia
io Nokia Paid Millions To Software Blackmailers Six Years Ago By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 15:25:27 GMT Full Article headline phone cybercrime data loss fraud cryptography finland nokia
io VeriSign To Sell Network Solutions Business By packetstormsecurity.com Published On :: Thu, 16 Oct 2003 14:17:58 GMT Full Article verisign
io ICANN Under Fire Over Domain Name Expansion By packetstormsecurity.com Published On :: Wed, 03 Apr 2013 04:10:56 GMT Full Article headline government dns verisign
io Icann's Internet Suffix Application Deadline Looms By packetstormsecurity.com Published On :: Thu, 12 Apr 2012 03:49:09 GMT Full Article headline verisign site
io Survey - Privacy Breaches Rampant In Corporations By packetstormsecurity.com Published On :: Thu, 13 Dec 2007 10:37:33 GMT Full Article privacy survey
io UK Most Popular Destination For 419 Scams By packetstormsecurity.com Published On :: Tue, 01 Jul 2008 03:22:36 GMT Full Article survey britain spam scam
io Data Breaches Cost $6.6 Million On Average, Survey Finds By packetstormsecurity.com Published On :: Sun, 01 Feb 2009 19:38:48 GMT Full Article survey data loss
io Survey - Hackers On Vacation Before Q4 Saturation By packetstormsecurity.com Published On :: Wed, 26 Aug 2009 10:43:39 GMT Full Article hacker privacy survey
io Oracle Details Most Serious Flaws In January Security Update By packetstormsecurity.com Published On :: Wed, 15 Jan 2014 16:26:01 GMT Full Article headline flaw patch oracle java
io Whisper This, But Java Deserialization Vulnerability Affects More Libraries By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:03:13 GMT Full Article headline flaw oracle java
io Solaris, Java Have Vulns That Let Users Run Riot By packetstormsecurity.com Published On :: Wed, 19 Jul 2017 14:23:05 GMT Full Article headline flaw oracle java
io Cisco Security Kit Has Java Deserialization Bug And A Default Password Snafu By packetstormsecurity.com Published On :: Thu, 08 Mar 2018 14:03:24 GMT Full Article headline flaw password cisco java
io jQuery Impacted By Prototype Pollution Flaw By packetstormsecurity.com Published On :: Mon, 22 Apr 2019 14:42:06 GMT Full Article headline flaw java
io Sega Loses Data For 1.3 Million Customers By packetstormsecurity.com Published On :: Sun, 19 Jun 2011 20:47:41 GMT Full Article headline hacker data loss sega
io US Dodges The Question Of Whether Its Military Built Stuxnet By packetstormsecurity.com Published On :: Mon, 30 May 2011 07:42:50 GMT Full Article headline government usa worm
io Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
io Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
io Microsoft SMB Server Zero Size Pool Allocation By packetstormsecurity.com Published On :: Fri, 13 Aug 2010 00:01:59 GMT A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition. Full Article
io Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
io Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
io 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
io ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
io How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
io Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
io Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
io PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
io Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
io Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
io Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
io Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
io CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
io Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
io Kim Dotcom Loses Latest Appeal Against US Extradition By packetstormsecurity.com Published On :: Thu, 05 Jul 2018 16:09:00 GMT Full Article headline government usa fraud mpaa new zealand
io Notorious eBay Hacker Gets 3-Year Suspended Sentence By packetstormsecurity.com Published On :: Thu, 03 Nov 2011 06:37:18 GMT Full Article headline hacker ebay
io eBay Faces Investigations Over Massive Data Breach By packetstormsecurity.com Published On :: Fri, 23 May 2014 13:11:24 GMT Full Article headline hacker database data loss password ebay
io eBay Pulls N9500 Chinese Spyware Phone From Auction Website By packetstormsecurity.com Published On :: Thu, 19 Jun 2014 13:30:15 GMT Full Article headline phone china cybercrime fraud spyware ebay backdoor
io Chrome Has A Different Take On Certificate Revocation By packetstormsecurity.com Published On :: Tue, 22 Apr 2014 15:09:19 GMT Full Article headline privacy flaw google ssl chrome cryptography
io Tech Giants Spend Millions To Stop Another Heartbleed By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:37 GMT Full Article headline microsoft flaw google ssl facebook cryptography
io Mozilla Certificate Revocation Tanks 107,000 Sites By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:21 GMT Full Article headline flaw ssl mozilla cryptography
io Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
io IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
io Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
io Court Adds New DMCA Exceptions By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 02:40:24 GMT Full Article government dmca
io Hackers, Others Seek DMCA Exemptions By packetstormsecurity.com Published On :: Wed, 03 Dec 2008 05:30:42 GMT Full Article hacker dmca
io Apple Files Opposition To DMCA Exemption For Jailbreaking By packetstormsecurity.com Published On :: Fri, 13 Feb 2009 12:00:58 GMT Full Article phone dmca apple
io IOActive Gagged By DMCA On Eve Of Wireless Key Vuln Reveal By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:47:37 GMT Full Article headline wireless flaw dmca
io Why Iraq is Buying up Playstation 2's By packetstormsecurity.com Published On :: Tue, 19 Dec 2000 13:23:22 GMT Full Article iraq sony
io Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq