on Big Brother Tracking Comes To Second Life By packetstormsecurity.com Published On :: Wed, 17 Sep 2008 22:54:23 GMT Full Article rfid
on Are RFID Chips A Personal Security Risk? By packetstormsecurity.com Published On :: Mon, 29 Sep 2008 13:42:53 GMT Full Article rfid
on Feds At DefCon Alarmed After RFIDs Scanned By packetstormsecurity.com Published On :: Tue, 04 Aug 2009 20:57:10 GMT Full Article government rfid
on European Commission Launches New Industry Guidelines On RFID Privacy By packetstormsecurity.com Published On :: Thu, 07 Apr 2011 05:05:29 GMT Full Article headline rfid
on Anonymous Takes Down Texan RFID-Tracking School By packetstormsecurity.com Published On :: Tue, 27 Nov 2012 06:11:09 GMT Full Article headline government privacy rfid anonymous
on Microsoft Windows WizardOpium Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 13:02:22 GMT Microsoft Windows WizardOpium local privilege escalation exploit. Full Article
on CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:33:36 GMT CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target. Full Article
on Microsoft Windows SMB 3.1.1 Remote Code Execution By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:39:33 GMT Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability. Full Article
on Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
on Microsoft Windows Net Use Insufficent Authentication By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:08:47 GMT The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present. Full Article
on Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:42:48 GMT Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges. Full Article
on Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
on Microsoft Windows Unquoted Service Path Privilege Escalation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 20:01:59 GMT This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem. Full Article
on Microsoft Twitter Accounts Hit Again By Syrian Electronic Army By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:33:03 GMT Full Article headline hacker microsoft twitter syria
on Syrian Electronic Army Gets Dose Of Own Medicine By packetstormsecurity.com Published On :: Wed, 15 Jan 2014 16:26:13 GMT Full Article headline hacker syria
on Syrian Electronic Army Claims CNN As Its Latest Victim By packetstormsecurity.com Published On :: Fri, 24 Jan 2014 16:14:29 GMT Full Article headline hacker syria
on SEA Screws With Facebook's WHOIS Via Mark Monitor By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:44 GMT Full Article headline hacker dns facebook syria
on Forbes.com Gets A Million Accounts Compromised By packetstormsecurity.com Published On :: Tue, 18 Feb 2014 04:24:22 GMT Full Article headline hacker data loss password syria
on Syrian Malware Team Found Spewing Dark Edition BlackWorm RAT By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:10 GMT Full Article headline hacker malware cybercrime fraud syria
on Second Hacking Crew Joins Syrian Electronic Army On Team Assad By packetstormsecurity.com Published On :: Tue, 02 Sep 2014 06:15:46 GMT Full Article headline hacker government syria
on UK Spy Drones To Fly Over Syria By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 21:58:00 GMT Full Article headline government britain cyberwar spyware syria
on Study: Hack Attack Aimed At ISIS' Opposition By packetstormsecurity.com Published On :: Sat, 20 Dec 2014 15:56:54 GMT Full Article headline cyberwar iraq terror syria
on US Army Website Defaced By Syrian Electronic Army By packetstormsecurity.com Published On :: Tue, 09 Jun 2015 13:30:43 GMT Full Article headline hacker government usa cyberwar syria
on Syrian Electronic Army Hacker Suspects Charged By packetstormsecurity.com Published On :: Wed, 23 Mar 2016 13:59:59 GMT Full Article headline hacker government usa fbi syria
on Guilty Plea For Syrian Electronic Army Accomplice By packetstormsecurity.com Published On :: Fri, 30 Sep 2016 14:28:46 GMT Full Article headline hacker malware cybercrime fraud germany syria
on European Surveillance Companies Were Eager To Sell Syria Tools Of Oppression By packetstormsecurity.com Published On :: Mon, 12 Dec 2016 17:14:20 GMT Full Article headline government privacy cyberwar spyware syria
on The US Shot Down A Mysterious Enemy Drone Over Syria By packetstormsecurity.com Published On :: Mon, 12 Jun 2017 14:23:08 GMT Full Article headline usa cyberwar syria
on Surgeon Thinks Hack Led To Syrian Air Strike By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 14:00:06 GMT Full Article headline hacker cyberwar syria
on These Hackers Are Using Android Surveillance Malware To Target Opponents Of The Syrian Government By packetstormsecurity.com Published On :: Mon, 10 Dec 2018 15:03:12 GMT Full Article headline hacker government malware fraud spyware syria
on Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
on Anonymous Posts Filipino President's Phone Numbers By packetstormsecurity.com Published On :: Mon, 17 Jun 2013 15:15:48 GMT Full Article headline hacker government data loss anonymous philippines
on 55 Million Voters' Details Leaked In The Philippines By packetstormsecurity.com Published On :: Thu, 07 Apr 2016 14:01:52 GMT Full Article headline hacker government privacy data loss philippines
on Philippines Elections Hack 'Leaks Voter Data' By packetstormsecurity.com Published On :: Tue, 12 Apr 2016 00:24:50 GMT Full Article headline hacker data loss philippines
on Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
on Tinc Virtual Private Network Daemon 1.0.36 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:04:57 GMT tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information. Full Article
on Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
on Hashes Generation And Injection Tool By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 03:07:26 GMT Hashes is a cross-platform tool that generates and injects different keys with the same hash code in order to test web applications against hash collision attacks. Written in Java. Has support for Java, PHP, ASP, and V8. Full Article
on ASP-DEv XM Forums RC 3 SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 11:11:11 GMT ASP-DEv XM Forums RC 3 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data. Full Article
on Avaya IP Office Customer Call Reporter Command Execution By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 23:54:22 GMT This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2. Full Article
on FCKEditor 2.6.8 ASP File Upload Protection Bypass By packetstormsecurity.com Published On :: Wed, 28 Nov 2012 01:33:11 GMT FCKEditor version 2.6.8 ASP version suffers from a file upload protection bypass. Full Article
on Cogent DataHub Command Injection By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 00:06:40 GMT This Metasploit module exploits an injection vulnerability in Cogent DataHub prior to 7.3.5. The vulnerability exists in the GetPermissions.asp page, which makes insecure use of the datahub_command function with user controlled data, allowing execution of arbitrary datahub commands and scripts. This Metasploit module has been tested successfully with Cogent DataHub 7.3.4 on Windows 7 SP1. Full Article
on Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS By packetstormsecurity.com Published On :: Thu, 25 Sep 2014 15:20:36 GMT Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability. Full Article
on ASP Dynamika 2.5 File Upload / SQL Injection By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 01:11:11 GMT ASP Dynamika version 2.5 suffers from arbitrary file upload and remote SQL injection vulnerabilities. Full Article
on AfterLogic WebMail Pro ASP.NET Account Takeover / XXE Injection By packetstormsecurity.com Published On :: Tue, 24 May 2016 15:37:56 GMT AfterLogic WebMail Pro ASP.NET versions prior to 6.2.7 suffer from an administrator account takeover via an XXE injection vulnerability. Full Article
on ASP.NET Core 5-RC1 HTTP Header Injection By packetstormsecurity.com Published On :: Fri, 23 Dec 2016 18:21:01 GMT ASP.NET Core version 5.-RC1 suffers from an HTTP header injection vulnerability. Full Article
on ASP.NET jVideo Kit 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 24 May 2018 18:08:18 GMT ASP.NET jVideo Kit version 1.0 suffers from a remote SQL injection vulnerability. Full Article
on LW-N605R Remote Code Execution By packetstormsecurity.com Published On :: Mon, 10 Sep 2018 20:22:22 GMT LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases. Full Article
on ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:27:39 GMT The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. Full Article
on Telerik UI Remote Code Execution By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 14:03:55 GMT The Telerik UI for ASP.NET AJAX insecurely deserializes JSON objects in a manner that results in arbitrary remote code execution on the software's underlying host. Full Article
on UK, Dutch Cops Cuff 5 More In Anonymous-LulzSec Raids By packetstormsecurity.com Published On :: Wed, 20 Jul 2011 14:33:21 GMT Full Article headline britain netherlands anonymous