me Google Axes 49 Malicious Chrome Extensions From Web Store By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:51 GMT Full Article headline malware google chrome
me CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
me China Blocks Google Services To Silence Tiananmen Critics By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 13:33:58 GMT Full Article headline government china google censorship
me Hong Kong ISPs Oppose Any Government Plans To Restrict Internet By packetstormsecurity.com Published On :: Thu, 29 Aug 2019 15:57:24 GMT Full Article headline government privacy china censorship
me Signal Is Finally Bringing Its Secure Messaging To The Masses By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:07 GMT Full Article headline privacy phone cryptography
me Why Are Governments So Vulnerable To Ransomware Attacks? By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:13 GMT Full Article headline government malware cybercrime fraud cryptography
me With Everyone WFH, VPN Security Has Become Paramount By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:38:00 GMT Full Article headline privacy cryptography
me Zoom Tackles Hackers With New Security Measures By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:55 GMT Full Article headline privacy phone flaw cryptography
me SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
me US Navy Wants 350 Billion Social Media Posts By packetstormsecurity.com Published On :: Tue, 28 May 2019 14:59:52 GMT Full Article headline government usa cyberwar facebook social twitter military
me US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
me FBI Seeks To Monitor Facebook, Oversee Mass Social Media Data Collection By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:16 GMT Full Article headline government privacy usa facebook social twitter fbi
me Former Twitter Employees Charged With Spying On Users For Saudis By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:51:02 GMT Full Article headline government cybercrime fraud spyware social saudi arabia twitter
me Hackers Hijack Social Media Accounts For The NFL By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:45:17 GMT Full Article headline hacker password twitter
me Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
me Windows Mobile 6.5 MessageBox Shellcode By packetstormsecurity.com Published On :: Tue, 28 Sep 2010 01:53:25 GMT Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM. Full Article
me ACDSee FotoSlate PLP File id Parameter Overflow By packetstormsecurity.com Published On :: Mon, 10 Oct 2011 22:35:13 GMT This Metasploit module exploits a buffer overflow in ACDSee FotoSlate 4.0 Build 146 via a specially crafted id parameter in a String element. When viewing a malicious PLP file with the ACDSee FotoSlate product, a remote attacker could overflow a buffer and execute arbitrary code. This exploit has been tested on systems such as Windows XP SP3, Windows Vista, and Windows 7. Full Article
me NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
me Meterpreter Swaparoo Windows Backdoor Method By packetstormsecurity.com Published On :: Mon, 20 May 2013 20:50:36 GMT Swaparoo - Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen. Full Article
me MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
me .NET Framework 4.6 DLL Hijacking By packetstormsecurity.com Published On :: Tue, 12 Apr 2016 14:44:44 GMT A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View. Full Article
me Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
me Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
me Hacker Gains Access To Some Private Microsoft GitHub Repos By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:12 GMT Full Article headline hacker microsoft data loss
me Turkish Hacker Defaces Kiwi Parliament Website By packetstormsecurity.com Published On :: Mon, 20 Sep 2010 01:09:00 GMT Full Article hacker government turkey
me Anonymous Pwns 74 Turkish Government Sites By packetstormsecurity.com Published On :: Fri, 08 Jul 2011 13:30:53 GMT Full Article headline government turkey anonymous
me Turkish Net Hijack Hits Big Name Websites By packetstormsecurity.com Published On :: Mon, 05 Sep 2011 14:28:05 GMT Full Article headline hacker israel turkey
me American Gets Targeted By Spy Tool Sold To Foreign Governments By packetstormsecurity.com Published On :: Tue, 04 Jun 2013 13:41:22 GMT Full Article headline government privacy malware usa spyware turkey
me Turkey Hijacks Servers In Social Media Crackdown By packetstormsecurity.com Published On :: Mon, 31 Mar 2014 14:37:14 GMT Full Article headline government dns google turkey twitter censorship
me These Ten Cities Are Home To The Biggest Botnets By packetstormsecurity.com Published On :: Tue, 04 Oct 2016 14:54:09 GMT Full Article headline malware cybercrime denial of service botnet fraud turkey
me Turkey's Government Tried To Hack Protestors Over Twitter By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:18 GMT Full Article headline hacker government fraud turkey twitter
me US Is Out Of The Picture In Syria-Turkey Crisis. Putin Now Owns This Mess. By packetstormsecurity.com Published On :: Sun, 20 Oct 2019 15:56:43 GMT Full Article headline government usa russia turkey syria military
me GNUnet P2P Framework 0.11.5 By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 16:11:23 GMT GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing. Full Article
me Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
me Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
me Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
me BIND Comes Apart Thanks To Ancient Denial Of Service Vuln By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 15:02:38 GMT Full Article headline dns denial of service flaw
me Scammers Abuse Multilingual Domain Names By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:32 GMT Full Article headline dns cybercrime fraud phish
me New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:39:20 GMT Full Article headline hacker malware dns
me Macs Framework 1.14f Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:33:28 GMT Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
me User Management System 2.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:23:07 GMT User Management System version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Full Article
me Complaint Management System 4.2 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:29:20 GMT Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
me Online AgroCulture Farm Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:15:37 GMT Online AgroCulture Farm Management System version 1.0 suffers from a remote SQL injection vulnerability. Full Article
me School File Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:16:26 GMT School File Management System version 1.0 suffers from a remote SQL injection vulnerability. Full Article
me Car Park Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:20:46 GMT Car Park Management System version 1.0 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
me KeePass Simple Dictionary Password Enumerator By packetstormsecurity.com Published On :: Wed, 04 Apr 2018 20:51:44 GMT This is a simple perl script to perform dictionary attacks against the KeePass password manager. Full Article
me SSH/SSL RSA Private Key Passphrase Dictionary Enumerator By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:22:49 GMT This is a script to perform SSH/SSL RSA private key passphrase enumeration with a dictionary attack. Full Article
me Ecommerce Systempay 1.0 Brute Force By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:44:17 GMT Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability. Full Article
me Track Coronavirus Updates In Real Time By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:25:04 GMT Full Article headline government virus science
me Smart Thermometers Detect Large Fever Outbreak In Florida By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 15:19:33 GMT Full Article headline government usa virus science