orm Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:15:52 GMT Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community. Full Article
orm Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
orm Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Exploit 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:08 GMT Proof of concept code that demonstrates an ASLR bypass of PIE compiled 64bit Linux. Full Article
orm Packet Storm Advisory 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:50 GMT The release of this advisory provides exploitation details in relation a weakness in the Linux ASLR implementation. The problem appears when the executable is PIE compiled and it has an address leak belonging to the executable. These details were obtained through the Packet Storm Bug Bounty program and are being released to the community. Full Article
orm Realtek SDK Information Disclosure / Code Execution By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 23:23:23 GMT Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities. Full Article
orm Jira 8.3.4 Information Disclosure By packetstormsecurity.com Published On :: Sun, 02 Feb 2020 09:32:22 GMT Jira version 8.3.4 suffers from a username enumeration information disclosure vulnerability. Full Article
orm AVideo Platform 8.1 User Enumeration By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:35:58 GMT AVideo Platform version 8.1 suffers from an information disclosure vulnerability that allows for user enumeration. Full Article
orm LabVantage 8.3 Information Disclosure By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:27:30 GMT LabVantage version 8.3 suffers from an information disclosure vulnerability. Full Article
orm SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:12:28 GMT SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities. Full Article
orm ManageEngine EventLog Analyzer 10.0 Information Disclosure By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 01:32:22 GMT ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability. Full Article
orm Citrix Gateway 11.1 / 12.0 / 12.1 Information Disclosure By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:04:24 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from an information disclosure vulnerability. Full Article
orm HP ThinPro 6.x / 7.x Information Disclosure By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:23:36 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability. Full Article
orm Swift File Transfer Mobile Cross Site Scripting / Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:27:35 GMT The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities. Full Article
orm Edimax EW-7438RPn Information Disclosure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:07:15 GMT Edimax EW-7438RPn suffers from an information disclosure vulnerability. Full Article
orm File Explorer 1.4 Information Disclosure By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:59:24 GMT File Explorer version 1.4 for iOS suffers from an information disclosure vulnerability. Full Article
orm rpc.pcnfsd Syslog Format String By packetstormsecurity.com Published On :: Sat, 22 May 2010 17:30:00 GMT rpc.pcnfsd suffers from a syslog related format string vulnerability. IBM AIX versions 6.1.0 and below, IRIX 6.5 and HP-UX versions 11.11, 11.23 and 11.31 are all affected. Full Article
orm TA505 Is Distributing A Brand New Form Of Malware By packetstormsecurity.com Published On :: Thu, 10 Jan 2019 13:54:13 GMT Full Article headline malware bank trojan cybercrime fraud cyberwar
orm xine-lib.formatstring.patch By packetstormsecurity.com Published On :: Sat, 08 Oct 2005 18:46:55 GMT Patch for the xine/gxine CD player that was found susceptible to a remote format string bug. The vulnerable code is found in the xine-lib library that both xine and gxine use. The vulnerable versions are at least xine-lib-0.9.13, 1.0, 1.0.1, 1.0.2 and 1.1.0. Full Article
orm U.S. Lawmakers To Introduce Bill That Threatens Encryption On Tech Platforms By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:43 GMT Full Article headline government privacy usa backdoor cryptography
orm Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
orm Twitter Sold User Security Information To Advertisers By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:25 GMT Full Article headline privacy data loss twitter
orm Former Twitter Employees Charged With Spying On Users For Saudis By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:51:02 GMT Full Article headline government cybercrime fraud spyware social saudi arabia twitter
orm BDA MPEG2 Transport Information Filter DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:55:55 GMT A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
orm Solaris xlock Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:38:33 GMT A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely. Full Article
orm German Police Storm Bulletproof Data Center In Former NATO Bunker By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:06 GMT Full Article headline government germany
orm ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:07:07 GMT Various ESET products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
orm Bitdefender Malformed Archive Bypass By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 21:21:14 GMT The parsing engine for various Bitdefender products supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (HOST_OS) so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
orm Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:58:50 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (Compressed Size) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
orm Bitdefender Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 16:00:02 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (RAR Compression Information) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
orm ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:29:59 GMT The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
orm Kaspersky Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 04:44:44 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
orm Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 11:01:11 GMT The Bitdefender parsing engine supports the GZIP archive format. The parsing engine can be bypassed by specifically manipulating a GZIP Archive (Compression Method) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
orm QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
orm Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
orm Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
orm iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
orm Greenfield FDI Performance Index 2019: Serbia storms to top By www.fdiintelligence.com Published On :: Mon, 12 Aug 2019 16:08:37 +0000 Research by fDi Intelligence reveals which countries receive more than their ‘expected share’ of FDI. Full Article
orm Top fDi Performers 2019 By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:42:06 +0000 A look at the results of fDi’s rankings throughout 2019 finds that Singapore and New York dominated the year’s league tables, followed by Shanghai, Tokyo and London Full Article
orm Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Get_Task.cgi Information Disclosure By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 23:44:44 GMT An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an information disclosure, resulting in the exposure of confidential information, including, but not limited to, plaintext passwords and SNMP community strings. An attacker can make an authenticated HTTP request, or run the binary, to trigger this vulnerability. Full Article
orm Sierra Wireless AirLink ES450 ACEManager template_load.cgi Information Disclosure By packetstormsecurity.com Published On :: Sat, 27 Apr 2019 17:20:43 GMT An exploitable information disclosure vulnerability exists in the ACEManager template_load.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a information leak, resulting in the disclosure of internal paths and files. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
orm Kenya Treasury chief ramps up reforms to grow investment By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:07 +0000 Kenya’s cabinet secretary for the national treasury and planning, Ukur Yatani, discusses the country’s agenda of fiscal reforms and the importance of constructing an east-west Africa highway. Full Article
orm Coronavirus: Facebook Alerts Users Exposed To Misinformation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:39 GMT Full Article headline virus fraud facebook social