it Secunia Security Advisory 48718 By packetstormsecurity.com Published On :: Thu, 05 Apr 2012 05:30:19 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
it Secunia Security Advisory 48720 By packetstormsecurity.com Published On :: Thu, 05 Apr 2012 05:30:28 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper IVE OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
it Secunia Security Advisory 49587 By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 06:52:22 GMT Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Juniper Networks Mobility System, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
it Router Exploitation By packetstormsecurity.com Published On :: Fri, 23 Nov 2012 23:44:46 GMT This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more. Full Article
it Secunia Security Advisory 51832 By packetstormsecurity.com Published On :: Tue, 15 Jan 2013 03:13:49 GMT Secunia Security Advisory - A vulnerability has been reported in Juniper JunosE, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
it Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 23 Jul 2013 14:44:44 GMT Juniper Secure Access software suffers from a reflective cross site scripting vulnerability. Full Article
it Juniper JunOS 9.x Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 24 Jul 2013 17:01:11 GMT Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks. Full Article
it Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
it Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
it Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
it Skippipe: Skipping The Watermark In Digital Content By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 14:02:22 GMT Whitepaper called Skippipe: Skipping the watermark in digital content. Full Article
it Manually Exploiting Intel AMT By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:39:06 GMT This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface. Full Article
it Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
it Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
it Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
it Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
it Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
it Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
it Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
it Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
it Packet Storm Exploit 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:08 GMT Proof of concept code that demonstrates an ASLR bypass of PIE compiled 64bit Linux. Full Article
it Packet Storm Advisory 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:50 GMT The release of this advisory provides exploitation details in relation a weakness in the Linux ASLR implementation. The problem appears when the executable is PIE compiled and it has an address leak belonging to the executable. These details were obtained through the Packet Storm Bug Bounty program and are being released to the community. Full Article
it Ubuntu Security Notice USN-4315-1 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:46:29 GMT Ubuntu Security Notice 4315-1 - Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to read arbitrary files via a symlink attack. Full Article
it Ubuntu Security Notice USN-4319-1 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:39:24 GMT Ubuntu Security Notice 4319-1 - It was discovered that the IPMI message handler implementation in the Linux kernel did not properly deallocate memory in certain situations. A local attacker could use this to cause a denial of service. Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-4318-1 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:39:34 GMT Ubuntu Security Notice 4318-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Gustavo Romero and Paul Mackerras discovered that the KVM implementation in the Linux kernel for PowerPC processors did not properly keep guest state separate from host state. A local attacker in a KVM guest could use this to cause a denial of service. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-4320-1 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:39:42 GMT Ubuntu Security Notice 4320-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Full Article
it Ubuntu Security Notice USN-4325-1 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:39 GMT Ubuntu Security Notice 4325-1 - It was discovered that the IPMI message handler implementation in the Linux kernel did not properly deallocate memory in certain situations. A local attacker could use this to cause a denial of service. Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-4324-1 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:45 GMT Ubuntu Security Notice 4324-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Shijie Luo discovered that the ext4 file system implementation in the Linux kernel did not properly check for a too-large journal size. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service. Various other issues were also addressed. Full Article
it Kernel Live Patch Security Notice LSN-0065-1 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:18:31 GMT Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). It was discovered that the KVM implementation in the Linux kernel, when paravirtual TLB flushes are enabled in guests, the hypervisor in some situations could miss deferred TLB flushes or otherwise mishandle them. An attacker in a guest VM could use this to expose sensitive information (read memory from another guest VM). Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Full Article
it QRadar Community Edition 7.3.1.6 Insecure File Permissions By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:09:24 GMT QRadar Community Edition version 7.3.1.6 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh. Full Article
it Red Hat Security Advisory 2020-1449-01 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:20:29 GMT Red Hat Security Advisory 2020-1449-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A local file overwrite vulnerability was addressed. Full Article
it Asterisk Project Security Advisory - AST-2018-001 By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 23:02:22 GMT Asterisk Project Security Advisory - The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number these desired ones are still stored internally. When an RTP packet was received this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example the payload number resulted in a video codec but the stream carried audio) a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of the type would always exist. Full Article
it Ubuntu Security Notice USN-3939-1 By packetstormsecurity.com Published On :: Mon, 08 Apr 2019 18:07:12 GMT Ubuntu Security Notice 3939-1 - Michael Hanselmann discovered that Samba incorrectly handled registry files. A remote attacker could possibly use this issue to create new registry files outside of the share, contrary to expectations. Full Article
it Ubuntu Security Notice USN-3939-2 By packetstormsecurity.com Published On :: Mon, 08 Apr 2019 18:07:33 GMT Ubuntu Security Notice 3939-2 - USN-3939-1 fixed a vulnerability in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM. Michael Hanselmann discovered that Samba incorrectly handled registry files. A remote attacker could possibly use this issue to create new registry files outside of the share, contrary to expectations. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3975-1 By packetstormsecurity.com Published On :: Tue, 14 May 2019 00:31:10 GMT Ubuntu Security Notice 3975-1 - It was discovered that the BigDecimal implementation in OpenJDK performed excessive computation when given certain values. An attacker could use this to cause a denial of service. Corwin de Boor and Robert Xiao discovered that the RMI registry implementation in OpenJDK did not properly select the correct skeleton class in some situations. An attacker could use this to possibly escape Java sandbox restrictions. Various other issues were also addressed. Full Article
it Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
it Red Hat Security Advisory 2019-2766-01 By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 20:40:57 GMT Red Hat Security Advisory 2019-2766-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the fixes for unbounded memory growth issues. Full Article
it Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
it Ubuntu Security Notice USN-4251-1 By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:54:37 GMT Ubuntu Security Notice 4251-1 - It was discovered that Tomcat incorrectly handled the RMI registry when configured with the JMX Remote Lifecycle Listener. A local attacker could possibly use this issue to obtain credentials and gain complete control over the Tomcat instance. It was discovered that Tomcat incorrectly handled FORM authentication. A remote attacker could possibly use this issue to perform a session fixation attack. Various other issues were also addressed. Full Article
it Source Engine CS:GO Build 4937372 Arbitrary Code Execution By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:22:22 GMT Source Engine CS:GO BuildID: 4937372 arbitrary code execution exploit. Full Article
it Red Hat Security Advisory 2020-1635-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:35 GMT Red Hat Security Advisory 2020-1635-01 - The GNU Debugger allows users to debug programs written in various programming languages including C, C++, and Fortran. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1716-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:55 GMT Red Hat Security Advisory 2020-1716-01 - The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Issues addressed include a code execution vulnerability. Full Article
it Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
it ManageEngine DataSecurity Plus Path Traversal / Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:40:45 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffers from a path traversal vulnerability that can lead to remote code execution. Full Article
it Secunia Security Advisory 46127 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 03:38:33 GMT Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges. Full Article
it Secunia Security Advisory 47236 By packetstormsecurity.com Published On :: Sun, 18 Dec 2011 01:20:04 GMT Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges. Full Article
it Secunia Security Advisory 47279 By packetstormsecurity.com Published On :: Sun, 18 Dec 2011 01:20:07 GMT Secunia Security Advisory - NetBSD has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
it Rootkit Hunter 1.4.0 By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:24:57 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
it Secunia Security Advisory 49440 By packetstormsecurity.com Published On :: Fri, 08 Jun 2012 07:05:50 GMT Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. Full Article
it Secunia Security Advisory 49264 By packetstormsecurity.com Published On :: Fri, 08 Jun 2012 07:05:59 GMT Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library. Full Article