si GNU SIP Witch Telephony Server 0.8.4 By packetstormsecurity.com Published On :: Tue, 13 Jul 2010 03:05:18 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 0.9.1 By packetstormsecurity.com Published On :: Tue, 17 Aug 2010 01:31:14 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 0.9.2 By packetstormsecurity.com Published On :: Thu, 11 Nov 2010 01:27:41 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 0.10.0 By packetstormsecurity.com Published On :: Sat, 26 Feb 2011 02:25:55 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 0.10.2 By packetstormsecurity.com Published On :: Fri, 18 Mar 2011 23:03:05 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 1.0.0 By packetstormsecurity.com Published On :: Sun, 15 May 2011 21:06:15 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 1.4.0 By packetstormsecurity.com Published On :: Thu, 22 Nov 2012 12:11:11 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si GNU SIP Witch Telephony Server 1.8.0 By packetstormsecurity.com Published On :: Mon, 09 Sep 2013 22:06:54 GMT GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate. Full Article
si Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
si SIPPTS 1.2.2 By packetstormsecurity.com Published On :: Tue, 23 Oct 2018 23:09:00 GMT SIPPTS is a set of tools to audit VoIP servers and devices using the SIP protocol. It is a set of perl scripts that allow you to identify extensions, remotely crack passwords, check for missing authentication to make phone calls, and more. Full Article
si Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Sat, 06 Mar 2010 15:42:52 GMT Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected. Full Article
si Juniper SSL VPN Bypass / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 01:05:48 GMT This is a list of older cross site scripting and bypass vulnerabilities associated with older Juniper IVE releases. Full Article
si Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 23 Jul 2013 14:44:44 GMT Juniper Secure Access software suffers from a reflective cross site scripting vulnerability. Full Article
si Juniper JunOS 9.x Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 24 Jul 2013 17:01:11 GMT Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks. Full Article
si Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
si COVID-19: Bay Area Requires All 7 Million Residents To Shelter In Place By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 22:34:52 GMT Full Article headline government usa virus
si Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:51 GMT Full Article headline government privacy usa virus phone
si Georgia Reopens Businesses As Death Toll Rises By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:10 GMT Full Article headline government usa virus
si Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
si Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
si Bypassing Root Detection Mechanism By packetstormsecurity.com Published On :: Fri, 01 May 2020 02:22:22 GMT Whitepaper called Bypassing Root Detection Mechanism. Written in Persian. Full Article
si Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
si Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:15:52 GMT Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community. Full Article
si Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
si Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
si Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
si Packet Storm Exploit 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:08 GMT Proof of concept code that demonstrates an ASLR bypass of PIE compiled 64bit Linux. Full Article
si Packet Storm Advisory 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:50 GMT The release of this advisory provides exploitation details in relation a weakness in the Linux ASLR implementation. The problem appears when the executable is PIE compiled and it has an address leak belonging to the executable. These details were obtained through the Packet Storm Bug Bounty program and are being released to the community. Full Article
si WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
si QRadar Community Edition 7.3.1.6 Insecure File Permissions By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:09:24 GMT QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh. Full Article
si BoltWire 6.03 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:32:12 GMT BoltWire version 6.03 suffers from a local file inclusion vulnerability. Full Article
si Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
si Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
si SimplePHPGal 0.7 Remote File Inclusion By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:49:23 GMT SimplePHPGal version 0.7 suffers from a remote file inclusion vulnerability. Full Article
si SI6 Networks' IPv6 Toolkit 1.3 By packetstormsecurity.com Published On :: Sun, 17 Feb 2013 19:22:22 GMT This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10. Full Article
si SI6 Networks' IPv6 Toolkit 1.3.3 By packetstormsecurity.com Published On :: Mon, 11 Mar 2013 20:22:22 GMT This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10. Full Article
si SI6 Networks' IPv6 Toolkit 1.3.4 By packetstormsecurity.com Published On :: Thu, 18 Apr 2013 00:13:24 GMT This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10. Full Article
si Poor Protocol Design For IoT Devices Fueling DDoS By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:00 GMT Full Article headline denial of service flaw
si California Man Arrested For DDoS'ing Candidate's Website By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:50:30 GMT Full Article headline government usa denial of service
si Swift File Transfer Mobile Cross Site Scripting / Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:27:35 GMT The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities. Full Article
si Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
si Malware Analysis Part I By packetstormsecurity.com Published On :: Tue, 04 Mar 2014 02:03:34 GMT Malware Analysis Part I - This guide is the first part of a series of three where we begin with setting up the very foundation of a analysis environment; the analysis station. It will give the reader a quick recap in the different phases of malware analysis along with a few examples. It will then guide the reader in how to build an analysis station optimized for these phases. Along with this, the guide also introduces a workflow that will give the reader a good kick-start in performing malware analysis on a professional basis, not only on a technical level. Full Article
si 900,000 WordPress Sites Attacked Via XSS Vulnerabilities By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:55 GMT Full Article headline hacker flaw wordpress
si Kernel Vulns In Android Devices Using Qualcomm Chips Explored By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:42 GMT Full Article headline hacker malware phone flaw google
si Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
si Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
si Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
si Lazarus Group Visits The Apple Orchard With New macOS Trojan By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:04 GMT Full Article headline malware trojan apple backdoor
si Russian-Led Troll Network Based In West Africa Uncovered By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:22:47 GMT Full Article headline government usa russia fraud africa cyberwar
si Russian State Hackers Behind San Francisco Airport Hack By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:33:09 GMT Full Article headline government malware russia cyberwar