on Hacktivists Ghost Shell Dump 1.6m Login Details On Web By packetstormsecurity.com Published On :: Tue, 11 Dec 2012 16:29:31 GMT Full Article headline hacker government usa data loss fbi nasa
on NASA Fires The Mona Lisa At The Moon With A Laser By packetstormsecurity.com Published On :: Sun, 20 Jan 2013 21:23:27 GMT Full Article headline science nasa
on Confused Brazilian Hacker Defaces NASA Web Sites In Protest Of NSA By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 15:16:33 GMT Full Article headline hacker government nsa nasa
on NASA's Plutonium Problem Could End Deep-Space Exploration By packetstormsecurity.com Published On :: Thu, 19 Sep 2013 15:07:08 GMT Full Article headline government space science nasa
on Video: Furloughed Workers Worry Shutdown Is Threatening National Security By packetstormsecurity.com Published On :: Thu, 10 Oct 2013 02:10:49 GMT Full Article headline government usa cyberwar nasa
on Briton Lauri Love Faces New US Hacking Charges By packetstormsecurity.com Published On :: Fri, 28 Feb 2014 03:03:13 GMT Full Article headline hacker government usa britain nasa
on Controlling The Kernel - Its All About DRM By packetstormsecurity.com Published On :: Fri, 20 Oct 2006 06:07:43 GMT Full Article kernel
on David Kernell Photo - Rep. Mike Kernell Son Sarah Palin Anonymous Hacker? By packetstormsecurity.com Published On :: Fri, 19 Sep 2008 08:38:14 GMT Full Article hacker kernel
on Unpatched Kernel-Level Vuln Affects All Windows Versions By packetstormsecurity.com Published On :: Fri, 06 Aug 2010 04:16:38 GMT Full Article microsoft kernel patch
on Die-Hard Bug Bytes Linux Kernel For Second Time By packetstormsecurity.com Published On :: Wed, 15 Sep 2010 13:12:30 GMT Full Article linux kernel
on China Locks Down 35M People Over Coronavirus Case By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:40 GMT Full Article headline virus china
on Coronavirus Brings China's Surveillance State Out Of The Shadows By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:20 GMT Full Article headline government privacy virus china
on Dropbox Used As Command And Control For Taiwan Time Bomb By packetstormsecurity.com Published On :: Mon, 30 Jun 2014 14:55:13 GMT Full Article headline malware botnet taiwan
on Researcher Publishes Second Steam Zero Day By packetstormsecurity.com Published On :: Wed, 21 Aug 2019 19:31:48 GMT Full Article headline hacker flaw zero day
on Zero-Day Privilege Escalation Disclosed For Android By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:45 GMT Full Article headline phone flaw google zero day
on Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:26 GMT Full Article headline hacker government data loss cyberwar zero day
on Ashley Madison Breach Extortion Scam Targets Hundreds By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:23 GMT Full Article headline hacker privacy cybercrime data loss fraud
on Chinese Hackers Have Breached Online Betting And Gambling Sites By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 14:57:20 GMT Full Article headline hacker privacy china cybercrime fraud
on Adobe Flash Player Type Confusion Remote Code Execution By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 02:01:15 GMT This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1. Full Article
on Adobe Flash Player Integer Underflow Remote Code Execution By packetstormsecurity.com Published On :: Mon, 05 May 2014 19:05:06 GMT This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild. Full Article
on AoA MP4 Converter 4.1.2 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:33:33 GMT AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability. Full Article
on X360 VideoPlayer ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Tue, 17 Feb 2015 18:25:40 GMT This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code. Full Article
on 1 Click Audio Converter 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:55:55 GMT 1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
on Advantech WebAccess 8.0 / 3.4.3 Code Execution By packetstormsecurity.com Published On :: Mon, 07 Sep 2015 14:33:33 GMT Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. Full Article
on UCanCode Remote Code Execution / Denial Of Service By packetstormsecurity.com Published On :: Thu, 24 Nov 2016 01:34:22 GMT UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks. Full Article
on BarcodeWiz ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Sat, 06 Jan 2018 18:33:30 GMT BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability. Full Article
on Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 20:22:22 GMT scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities. Full Article
on Adobe Flash Active-X 28.0.0.137 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 24 Dec 2018 04:44:44 GMT Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit. Full Article
on Bash 5.0 Patch 11 Privilege Escalation By packetstormsecurity.com Published On :: Fri, 29 Nov 2019 16:40:01 GMT An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected. Full Article
on Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
on AG Barr Asks Facebook To Not Use End To End Encryption By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:34 GMT Full Article headline government privacy usa spyware facebook social cryptography
on Cozy Bear Is Back In Action Again By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:50 GMT Full Article headline government usa russia fraud cyberwar facebook social
on Two Plead Guilty In Conspiracy Involving Uber, LinkedIn, Others By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 14:20:28 GMT Full Article headline hacker privacy cybercrime data loss fraud social uber
on System Bug Gives Facebook Access To iPhone Cameras By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:40 GMT Full Article headline privacy phone flaw apple facebook social
on 15 Anonymous Suspects Arrested By Italian And Swiss Police By packetstormsecurity.com Published On :: Wed, 06 Jul 2011 14:27:49 GMT Full Article headline hacker italy anonymous switzerland
on Encrypted Email Service ProtonMail Opens Door For Tor Users By packetstormsecurity.com Published On :: Thu, 19 Jan 2017 13:55:21 GMT Full Article headline government privacy email spyware cryptography switzerland
on connect-core5.c By packetstormsecurity.com Published On :: Tue, 08 Nov 2005 15:27:36 GMT Linux/ppc shellcode which connects /bin/sh to a host. connect-core5.s is appended. Full Article
on Linux Kernel Sendpage Local Privilege Escalation By packetstormsecurity.com Published On :: Thu, 19 Jul 2012 00:45:23 GMT The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4 Full Article
on Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
on KeeWeb 1.14.0 HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:23:04 GMT KeeWeb version 1.14.0 suffers from an html injection vulnerability. Full Article
on Exposed Database Dumps PII Of 1.6 Million Job Seekers By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:55 GMT Full Article headline privacy database data loss
on Exposed Orvibo Database Leaks Two Billion Records By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 13:57:53 GMT Full Article headline privacy database china data loss
on Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
on MoviePass Database Exposes 161 Million Records By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:43 GMT Full Article headline hacker privacy database data loss
on Leaky Autoclerk Database Exposes Info On Travelers By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 16:39:14 GMT Full Article headline government privacy database data loss spyware military
on Database Exposes Millions Of Private SMS Messages By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:32:01 GMT Full Article headline privacy phone database data loss flaw
on iWatch Filesystem Monitor 0.2.2 By packetstormsecurity.com Published On :: Wed, 18 Nov 2009 14:01:05 GMT iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel. Full Article
on Malmon Detection Tool 0.1b By packetstormsecurity.com Published On :: Fri, 21 Jan 2011 20:11:11 GMT Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory. Full Article
on Malmon Detection Tool 0.3 By packetstormsecurity.com Published On :: Wed, 02 Feb 2011 18:22:11 GMT Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory. Full Article
on Chkrootkit Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 20 Nov 2015 01:09:39 GMT Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default. Full Article