pr Presidential Race In Brazil Marred By WhatsApp Scandal By packetstormsecurity.com Published On :: Fri, 19 Oct 2018 13:04:45 GMT Full Article headline government privacy phone facebook brazil
pr Brazil's Largest Professional Association Suffers Massive Data Leak By packetstormsecurity.com Published On :: Sun, 25 Nov 2018 22:25:26 GMT Full Article headline privacy data loss brazil
pr Telegram Voicemail Hack Used Against Brazil's President, Ministers By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:32 GMT Full Article headline hacker government phone spyware brazil
pr Most Brazilians Believe Companies Don't Protect Their Data By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:54 GMT Full Article headline privacy data loss brazil
pr Brazil Fines Facebook $1.6 Million For Improper Sharing Of Data By packetstormsecurity.com Published On :: Mon, 30 Dec 2019 17:48:50 GMT Full Article headline government privacy data loss fraud facebook social brazil
pr Brazil Prosecutes Greenwald In Attack On Press Freedom By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:40 GMT Full Article headline government data loss brazil
pr MQTT Protocol Overview By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:21:53 GMT This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices. Full Article
pr Data Leak Revealed At South Africa's Main Electricity Provider By packetstormsecurity.com Published On :: Wed, 06 Feb 2019 13:58:54 GMT Full Article headline hacker data loss africa scada
pr Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices By packetstormsecurity.com Published On :: Mon, 29 Jul 2019 16:35:51 GMT Full Article headline hacker flaw scada
pr NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download By packetstormsecurity.com Published On :: Tue, 23 Jan 2018 04:51:52 GMT NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user. Full Article
pr ProCheckUp Security Advisory 2009.16 By packetstormsecurity.com Published On :: Thu, 15 Jul 2010 00:49:36 GMT Procheckup has found by making a malformed request to the Juniper IVE Web interface without authentication, that a vanilla cross site scripting (XSS) attack is possible. Full Article
pr Juniper Secure Access SSL VPN Privilege Escalation By packetstormsecurity.com Published On :: Sat, 22 Dec 2018 18:07:08 GMT Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Full Article
pr Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
pr The CFAA Is Finally Being Reviewed By The Supreme Court By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:16 GMT Full Article headline hacker government usa
pr DevSecOps: A Secured Approach By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:35:06 GMT Whitepaper called DevSecOps: A Secure Approach. Full Article
pr From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
pr Blind CreateRemoteThread Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:21:40 GMT Whitepaper called Blind CreateRemoteThread Privilege Escalation. Full Article
pr WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
pr Druva inSync Windows Client 6.5.2 Privilege Escalation By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:00:54 GMT Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability. Full Article
pr Asterisk Project Security Advisory - AST-2018-001 By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 23:02:22 GMT Asterisk Project Security Advisory - The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number these desired ones are still stored internally. When an RTP packet was received this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example the payload number resulted in a video codec but the stream carried audio) a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of the type would always exist. Full Article
pr Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:22:57 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability. Full Article
pr Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:24:41 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability. Full Article
pr Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
pr Windows UAC Protection Bypass By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 19:20:15 GMT This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. Full Article
pr VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
pr Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:01 GMT This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. Full Article
pr Windows Escalate UAC Protection Bypass By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:34:40 GMT This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when Windows backup and restore is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked. Full Article
pr Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
pr Microsoft Windows Kernel Privilege Escalation By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 23:02:22 GMT This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tracing functionality used by the Routing and Remote Access service. The issue results from the lack of proper permissions on registry keys that control this functionality. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Full Article
pr School ERP Pro 1.0 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:32:10 GMT School ERP Pro version 1.0 suffers from a remote code execution vulnerability. Full Article
pr Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
pr NetBSD mail.local Privilege Escalation By packetstormsecurity.com Published On :: Thu, 15 Sep 2016 17:13:45 GMT This Metasploit module attempts to exploit a race condition in mail.local with the SUID bit set on: NetBSD 7.0 - 7.0.1 (verified on 7.0.1), NetBSD 6.1 - 6.1.5, and NetBSD 6.0 - 6.0.6. Successful exploitation relies on a crontab job with root privilege, which may take up to 10min to execute. Full Article
pr NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
pr Poor Protocol Design For IoT Devices Fueling DDoS By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:00 GMT Full Article headline denial of service flaw
pr SWAPGS Attack Proof Of Concept By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:46:42 GMT SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel. Full Article
pr Broadcom Wi-Fi KR00K Proof Of Concept By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:14:05 GMT Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs. Full Article
pr HP ThinPro 6.x / 7.x Information Disclosure By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:23:36 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability. Full Article
pr Cisco Discovery Protocol (CDP) Remote Device Takeover By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:56 GMT Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices. Full Article
pr Cisco Unified Contact Center Express Privilege Escalation By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:26:11 GMT Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability. Full Article
pr Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
pr Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
pr prdelka-vs-SGI-xrunpriv By packetstormsecurity.com Published On :: Fri, 27 Oct 2006 21:32:01 GMT SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit. Full Article
pr Irix LPD tagprinter Command Execution By packetstormsecurity.com Published On :: Tue, 27 Oct 2009 16:00:56 GMT This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Full Article
pr 900,000 WordPress Sites Attacked Via XSS Vulnerabilities By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:55 GMT Full Article headline hacker flaw wordpress
pr TBA_v1_prc.zip By packetstormsecurity.com Published On :: Wed, 29 Mar 2000 01:56:31 GMT TBA is the first wardialer for the PalmOS platform. Using a Palm device with a modem, you can wardial from anywhere a phone line is available - throw it in a phone can to retrieve later, toss it up in the ceiling during a security audit - the possibilities are endless. Full Article
pr Ursnif Banking Trojan Spreading In Japan By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 17:45:54 GMT Full Article headline malware bank trojan cybercrime fraud japan
pr Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
pr NanoCore Trojan Is Protected In Memory From Being Killed Off By packetstormsecurity.com Published On :: Wed, 16 Jan 2019 13:35:39 GMT Full Article headline malware trojan
pr Shifty New Variant Of Qbot Banking Trojan Spreads By packetstormsecurity.com Published On :: Fri, 01 Mar 2019 00:17:09 GMT Full Article headline malware bank trojan
pr Bank Hackers Team Up To Spread Financial Trojans Worldwide By packetstormsecurity.com Published On :: Wed, 20 Mar 2019 13:35:04 GMT Full Article headline hacker malware bank trojan cybercrime fraud