on Twitter Sold User Security Information To Advertisers By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:25 GMT Full Article headline privacy data loss twitter
on Former Twitter Employees Charged With Spying On Users For Saudis By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:51:02 GMT Full Article headline government cybercrime fraud spyware social saudi arabia twitter
on Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
on Xcon2005_San.pdf By packetstormsecurity.com Published On :: Wed, 31 Aug 2005 10:17:25 GMT Xcon 2005: Hacking Windows CE Full Article
on Quest InTrust Annotation Objects Uninitialized Pointer By packetstormsecurity.com Published On :: Fri, 13 Apr 2012 22:12:21 GMT This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser. Full Article
on Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
on Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
on NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
on MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
on HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
on MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
on MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
on MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
on BDA MPEG2 Transport Information Filter DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:55:55 GMT A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
on HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
on Hacker Selling Data Of 538 Million Weibo Users By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:53 GMT Full Article headline hacker china cybercrime data loss fraud
on Personal Details For Entire Country Of Georgia Leaked Online By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:42 GMT Full Article headline government privacy data loss
on 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss
on Ransomware Scumbags Release Confidential Docs By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:02 GMT Full Article headline hacker malware data loss
on Account Details For 4 Million Quidd Users Shared On Hacking Forum By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:33:05 GMT Full Article headline hacker privacy data loss
on Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
on Coronavirus: Health Leaders Credentials Dumped Online By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:03 GMT Full Article headline hacker government privacy virus data loss password
on Valve Confirms CS:GO, Team Fortress 2 Source Code Leak By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:19 GMT Full Article headline hacker data loss
on Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
on Hacker Finds Old Tesla Parts On eBay Full Of User Data By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:22 GMT Full Article headline hacker privacy data loss
on Anonymous Pwns 74 Turkish Government Sites By packetstormsecurity.com Published On :: Fri, 08 Jul 2011 13:30:53 GMT Full Article headline government turkey anonymous
on Turkey Approves Legislation To Block Internet Sites By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:49 GMT Full Article headline government turkey facebook twitter anonymous censorship
on Turkish Hacker Receives Record 334 Years In Prison Over Data Theft By packetstormsecurity.com Published On :: Wed, 13 Jan 2016 02:42:42 GMT Full Article headline hacker cybercrime fraud identity theft turkey
on Turkey Blocks Access To Tor Anonymizing Network By packetstormsecurity.com Published On :: Mon, 19 Dec 2016 18:58:37 GMT Full Article headline government privacy turkey cryptography
on Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
on Trump's Syria Move Blindsides National Security Leaders By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 13:55:30 GMT Full Article headline government usa turkey terror syria
on Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
on Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
on SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
on Solaris xlock Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:38:33 GMT A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely. Full Article
on Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
on Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
on Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
on DNS Requests Are Routinely Spied On By packetstormsecurity.com Published On :: Mon, 20 Aug 2018 15:50:44 GMT Full Article headline privacy dns spyware
on A Deep Dive On The Recent Widespread DNS Hijacking Attacks By packetstormsecurity.com Published On :: Tue, 19 Feb 2019 15:23:06 GMT Full Article headline hacker privacy dns cyberwar phish
on State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:29 GMT Full Article headline hacker government dns cyberwar
on DNSpionage Actors Adjust Tactics, Debut New RAT By packetstormsecurity.com Published On :: Thu, 25 Apr 2019 15:52:44 GMT Full Article headline hacker government dns fraud cyberwar
on Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
on New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:39:20 GMT Full Article headline hacker malware dns
on SAPUI5 1.0.0 / SAP Gateway 7.5 / 7.51 / 7.52 / 7.53 Content Spoofing By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 02:22:22 GMT SAPUI5 version 1.0.0 and the SAP Gateway versions 7.5, 7.51, 7.52 and 7.53are vulnerable to content spoofing in multiple parameters. Full Article
on Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 21:17:15 GMT Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability. Full Article
on Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 20:48:19 GMT A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected. Full Article
on Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:42:41 GMT Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability. Full Article
on CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
on UFONet 1.4 By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 14:17:29 GMT UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc. Full Article