to White House Expects To Veto Revised CISPA Bill By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 05:48:19 GMT Full Article headline government privacy usa riaa mpaa
to US Government Is Trying To Extradite Kimble By packetstormsecurity.com Published On :: Tue, 29 Sep 2015 01:20:20 GMT Full Article headline hacker government usa riaa mpaa new zealand
to linux-history.html By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:05:10 GMT The Great War: Linux -vs- Minix Full Article
to Half Of Oracle E-Business Customers Open To Bank Fraud Flaw By packetstormsecurity.com Published On :: Wed, 20 Nov 2019 15:01:28 GMT Full Article headline bank cybercrime fraud flaw oracle
to cabrightstor_disco.pm By packetstormsecurity.com Published On :: Fri, 18 Feb 2005 06:18:59 GMT The CA BrightStor Discovery Service overflow exploit is a perl module exploits a vulnerability in the CA BrightStor Discovery Service which occurs when a large request is sent to UDP port 41524, triggering a stack overflow. Targets include Win32, win2000, winxp, and win2003. More information available here. Full Article
to cabrightstor_disco_servicepc.pm By packetstormsecurity.com Published On :: Fri, 18 Feb 2005 06:24:02 GMT CA BrightStor Discovery Service SERVICEPC Overflow for Win32, win2000, winxp, and win2003 which exploits a vulnerability in the TCP listener on port 45123. Affects all known versions of the BrightStor product. More information available here. Full Article
to vinetto-alpha-0.05.tar.gz By packetstormsecurity.com Published On :: Sat, 29 Apr 2006 10:43:47 GMT Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X. Full Article
to vinetto-alpha-0.06.tar.gz By packetstormsecurity.com Published On :: Tue, 09 May 2006 21:25:14 GMT Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X. Full Article
to 02062007-raptor_winudf.tgz By packetstormsecurity.com Published On :: Thu, 08 Feb 2007 05:08:50 GMT This is a MySQL backdoor kit for Windows based on the UDFs (User Defined Functions) mechanism. It can be used to spawn a reverse shell (netcat UDF on port 80/tcp) or to execute single OS commands (exec UDF). Tested on MySQL 4.0.18-win32 (running on Windows XP SP2), MySQL 4.1.22-win32 (running on Windows XP SP2), MySQL 5.0.27-win32 (running on Windows XP SP2). Full Article
to vinetto-beta-0.07.tar.gz By packetstormsecurity.com Published On :: Wed, 20 Jun 2007 04:35:36 GMT Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X. Full Article
to Whale Win32 Attack Surface Toolkit By packetstormsecurity.com Published On :: Wed, 07 Dec 2016 00:44:44 GMT Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems. Full Article
to CentOS Control Web Panel 0.9.8.836 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:32:22 GMT CentOS Control Web Panel version 0.9.8.836 suffers from a privilege escalation vulnerability. Full Article
to CentOS Control Web Panel 0.9.8.836 Authentication Bypass By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 18:34:44 GMT CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. Full Article
to CentOS Control Web Panel 0.9.8.838 User Enumeration By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 19:44:44 GMT CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:52:30 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel 0.9.8.840 User Enumeration By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:54:03 GMT CentOS-WebPanel.com Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel 0.9.8.846 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:55:44 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.848 User Enumeration By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:02:22 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:05:24 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. Full Article
to CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:06:49 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. Full Article
to CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:59:03 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability. Full Article
to CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:01:11 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability. Full Article
to ptrace Sudo Token Privilege Escalation By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:07:57 GMT This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64). Full Article
to CentOS WebPanel 7 SQL Injection By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:51:26 GMT CentOS Webpanel version 7 suffers from a remote SQL injection vulnerability. Full Article
to Crypto Boffins Urge Belgium To Withdraw Early ePassports By packetstormsecurity.com Published On :: Sun, 10 Jun 2007 09:42:05 GMT Full Article flaw passport
to US To Issue Wireless Passports By packetstormsecurity.com Published On :: Fri, 04 Jan 2008 22:55:23 GMT Full Article usa wireless passport
to Rice Apologizes To Obama For Passport Hack By packetstormsecurity.com Published On :: Fri, 21 Mar 2008 10:40:57 GMT Full Article government passport
to THC/vonJeek Provide You The Ability To Clone ePassports By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 17:01:48 GMT Full Article passport
to Foreign Office Changes Tourist Advice After Israeli Inquiry By packetstormsecurity.com Published On :: Wed, 24 Mar 2010 11:54:02 GMT Full Article israel passport
to Yet Another Hacker Harassed At Customs By packetstormsecurity.com Published On :: Fri, 19 Nov 2010 16:42:49 GMT Full Article headline hacker government privacy passport
to Magento WooCommerce CardGate Payment Gateway 2.0.30 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:09:50 GMT Magento WooCommerce CardGate Payment Gateway version 2.0.30 suffers from a payment process bypass vulnerability. Full Article
to HP Performance Monitoring xglance Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 16:37:14 GMT This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root. Full Article
to Guardian Told It Was Target Of Saudi Hacking Unit After Khashoggi Killing By packetstormsecurity.com Published On :: Wed, 26 Jun 2019 14:20:38 GMT Full Article headline hacker government privacy phone britain cyberwar spyware saudi arabia
to Jeff Bezos Met FBI Investigators In 2019 Over Alleged Saudi Hack By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:28:31 GMT Full Article headline hacker privacy malware usa phone amazon data loss spyware saudi arabia
to OpenSSL Toolkit 1.1.1f By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:43:06 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
to SQLMAP - Automatic SQL Injection Tool 1.4.4 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:53:52 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
to Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
to Intel Chip Flaw - Math Unit May Spill Crypto Secrets To Apps By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 01:21:32 GMT Full Article headline data loss flaw cryptography intel
to 007 Code Helps Stop Spectre Exploits Before They Exist By packetstormsecurity.com Published On :: Tue, 17 Jul 2018 14:19:08 GMT Full Article headline flaw patch intel
to New Spectre Attack Enables Secrets To Be Leaked Over A Network By packetstormsecurity.com Published On :: Fri, 27 Jul 2018 00:57:39 GMT Full Article headline hacker flaw intel
to Intel's Commitment To Making Its Stuff Secure Is Called Into Question By packetstormsecurity.com Published On :: Mon, 08 Oct 2018 14:48:27 GMT Full Article headline flaw intel
to Intel CPUs Fall To New Hyperthreading Exploit That Pilfers Keys By packetstormsecurity.com Published On :: Sat, 03 Nov 2018 15:48:08 GMT Full Article headline flaw cryptography intel
to Intel's SGX Coughs Up Crypto Keys When Scientists Tweak CPU Voltage By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:11 GMT Full Article headline flaw cryptography intel
to RIAA Wants Infamous File-Sharer To Campaign Against Piracy By packetstormsecurity.com Published On :: Thu, 11 Jul 2013 14:51:08 GMT Full Article headline riaa mpaa pirate
to Kimble Quits Mega To Become A Politician By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 15:22:00 GMT Full Article headline government pirate new zealand
to British Ask Web Registrars To Blacklist Filesharing Websites By packetstormsecurity.com Published On :: Wed, 09 Oct 2013 15:23:54 GMT Full Article headline government britain riaa mpaa pirate
to Netherlands Court Orders End To Pirate Bay Ban By packetstormsecurity.com Published On :: Wed, 29 Jan 2014 16:00:05 GMT Full Article headline government netherlands pirate censorship
to Pirate Bay Co-Founder Arrested In Sweden To Serve Sentence By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 02:36:13 GMT Full Article headline government mpaa pirate sweden
to TV Monitoring Service Is Fair Use, Judge Rules By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 04:14:16 GMT Full Article headline government pirate
to The Pirate Bay Uses The Cloud To Stay Out Of Law Enforcement's Reach By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:35 GMT Full Article headline government riaa mpaa pirate