me Linux PTRACE_TRACEME Local Root By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 15:11:15 GMT Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique. Full Article
me TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 23:55:55 GMT TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization. Full Article
me Jeff Bezos Met FBI Investigators In 2019 Over Alleged Saudi Hack By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:31 GMT Full Article headline hacker privacy malware usa phone amazon data loss spyware saudi arabia
me Recon Informer By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:50:32 GMT Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy. Full Article
me WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
me Intel's Commitment To Making Its Stuff Secure Is Called Into Question By packetstormsecurity.com Published On :: Mon, 08 Oct 2018 14:48:27 GMT Full Article headline flaw intel
me Intel Patches High-Severity Flaws In Media SDK, Mini PC By packetstormsecurity.com Published On :: Wed, 10 Apr 2019 15:01:30 GMT Full Article headline flaw patch intel
me Kimble Quits Mega To Become A Politician By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 15:22:00 GMT Full Article headline government pirate new zealand
me Kimble Sues New Zealand Government For Millions By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 15:08:24 GMT Full Article headline government usa mpaa pirate new zealand
me Pirate Bay Founder In Solitary Confinement Without Warrant By packetstormsecurity.com Published On :: Thu, 12 Dec 2013 17:00:50 GMT Full Article headline government pirate sweden
me The Pirate Bay Uses The Cloud To Stay Out Of Law Enforcement's Reach By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:35 GMT Full Article headline government riaa mpaa pirate
me 6 Men Admit To Running A Global $100M Software Piracy Ring By packetstormsecurity.com Published On :: Fri, 18 Dec 2015 21:03:17 GMT Full Article headline cybercrime fraud pirate
me Megaupload Execs' Extradition May Be At Risk By packetstormsecurity.com Published On :: Fri, 25 Aug 2017 14:19:05 GMT Full Article headline government data loss riaa mpaa pirate new zealand
me Gold Galleon Hackers Target Maritime Shipping Industry By packetstormsecurity.com Published On :: Thu, 19 Apr 2018 14:06:34 GMT Full Article headline hacker pirate
me Games Of Thrones Has The Most Malware Of Any Pirated TV Show By packetstormsecurity.com Published On :: Wed, 03 Apr 2019 14:01:33 GMT Full Article headline malware mpaa pirate
me User Management System 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:19:35 GMT User Management System version 2.0 suffers from a persistent cross site scripting vulnerability. Full Article
me Complaint Management System 4.2 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:24:07 GMT Complaint Management System version 4.2 suffers from a persistent cross site scripting vulnerability. Full Article
me WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:51:15 GMT WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability. Full Article
me WordPress Dosimple Theme 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:52:13 GMT WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability. Full Article
me Grub2 grub2-set-bootflag Environment Corruption By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 23:02:22 GMT Grub2 has grub2-set-bootflag setuid in the new Fedora release and has the ability to corrupt the environment. Full Article
me Latin America Becoming Newest Malware Hotbed By packetstormsecurity.com Published On :: Fri, 03 May 2013 14:50:16 GMT Full Article headline malware cyberwar venezuela brazil scada
me Hackers Pop Brazil Newspapers To Root Home Routers By packetstormsecurity.com Published On :: Mon, 15 Sep 2014 14:15:02 GMT Full Article headline hacker brazil
me Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
me WhatsApp Executives Come To Brazil To Avoid New Bans By packetstormsecurity.com Published On :: Mon, 05 Jun 2017 18:40:42 GMT Full Article headline government privacy facebook brazil cryptography
me 100,000 Home Routers Recruited To Spread Brazilian Hacking Scam By packetstormsecurity.com Published On :: Tue, 02 Oct 2018 14:13:41 GMT Full Article headline hacker malware fraud brazil
me .NET Instrumentation Via MSIL Bytecode Injection By packetstormsecurity.com Published On :: Fri, 12 Jan 2018 14:44:44 GMT Whitepaper from Phrack called .NET Instrumentation via MSIL bytecode injection. Full Article
me New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
me Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
me ICMPv6 Router Announcement Flooding Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 Apr 2011 16:29:18 GMT An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it. Full Article
me California Issues Statewide Stay At Home Order To Combat COVID-19 By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:08 GMT Full Article headline government usa virus
me The CFAA Is Finally Being Reviewed By The Supreme Court By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:16 GMT Full Article headline hacker government usa
me Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
me Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
me Bypassing Root Detection Mechanism By packetstormsecurity.com Published On :: Fri, 01 May 2020 02:22:22 GMT Whitepaper called Bypassing Root Detection Mechanism. Written in Persian. Full Article
me Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
me Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
me Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
me Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
me Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
me Triologic Media Player 8 Buffer Overflow By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 18:32:22 GMT Triologic Media Player version 8 suffers from a .m3l local buffer overflow vulnerability. Full Article
me WordPress Media Library Assistant 2.81 Local File Inclusion By packetstormsecurity.com Published On :: Mon, 13 Apr 2020 11:01:11 GMT WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability. Full Article
me Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
me Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
me Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
me Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
me Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
me Suspected Commonwealth Games DDoS Was Only A Fortnite Update By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:20 GMT Full Article headline denial of service
me Anonymous Hacker Gets 6 Years For Some Lame DDoS Attacks By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:01:52 GMT Full Article headline hacker denial of service anonymous
me AVideo Platform 8.1 User Enumeration By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:35:58 GMT AVideo Platform version 8.1 suffers from an information disclosure vulnerability that allows for user enumeration. Full Article
me Cisco M1070 Content Security Management Appliance IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:35:49 GMT Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit. Full Article