b Putin Signs Internet Sovereignty Bill That Expands Censorship By packetstormsecurity.com Published On :: Fri, 03 May 2019 14:11:56 GMT Full Article headline government russia censorship
b The White House Readies Draft Of Executive Order That Could Break The Internet By packetstormsecurity.com Published On :: Sat, 10 Aug 2019 16:23:17 GMT Full Article headline government usa facebook social censorship
b Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
b Apple May Be Forced To Disclose China Censorship Requests By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 14:59:59 GMT Full Article headline government china apple censorship
b Signal Is Finally Bringing Its Secure Messaging To The Masses By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:07 GMT Full Article headline privacy phone cryptography
b U.S. Lawmakers To Introduce Bill That Threatens Encryption On Tech Platforms By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:28:43 GMT Full Article headline government privacy usa backdoor cryptography
b Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
b Bruce Schneier Proposes Hacking Society For A Better Tomorrow By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:23 GMT Full Article headline hacker conference cryptography rsa
b Facebook Denies Reports It Is Backing Away From Libra Cryptocurrency By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:30 GMT Full Article headline bank facebook cryptography
b Why Are Governments So Vulnerable To Ransomware Attacks? By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:13 GMT Full Article headline government malware cybercrime fraud cryptography
b With Everyone WFH, VPN Security Has Become Paramount By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:38:00 GMT Full Article headline privacy cryptography
b DigiCert Hit By Hackers Through Buggy Config Tool By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:11 GMT Full Article headline hacker flaw password cryptography
b Major European Private Hospital Operator Struck By Ransomware By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:51 GMT Full Article headline malware cryptography
b The CIA's Password For Their Hacking Tools Was 123ABCdef By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:20 GMT Full Article headline hacker government data loss password cia
b Facebook Opens Portal Gizmo To Pwn2Own Exploit Fest By packetstormsecurity.com Published On :: Thu, 29 Aug 2019 15:57:28 GMT Full Article headline hacker canada flaw facebook social conference
b Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
b Debian Security Advisory 4481-1 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 18:22:22 GMT Debian Linux Security Advisory 4481-1 - Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Image.open with specially crafted URLs coming from unsanitized user input. Full Article
b Ubuntu Security Notice USN-4201-1 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:23:06 GMT Ubuntu Security Notice 4201-1 - It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed. Full Article
b Debian Security Advisory 4587-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:32 GMT Debian Linux Security Advisory 4587-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
b Debian Security Advisory 4586-1 By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:42:38 GMT Debian Linux Security Advisory 4586-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which could result in unauthorized access by bypassing intended path matchings, denial of service, or the execution of arbitrary code. Full Article
b Russia Opens Case Against Facebook, Twitter Over Data Laws By packetstormsecurity.com Published On :: Tue, 22 Jan 2019 14:26:52 GMT Full Article headline government privacy russia spyware facebook twitter
b Twitter Bot Activity Spiked After The Release Of The Mueller Report By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:49:57 GMT Full Article headline government usa russia fraud cyberwar twitter fbi
b US Navy Wants 350 Billion Social Media Posts By packetstormsecurity.com Published On :: Tue, 28 May 2019 14:59:52 GMT Full Article headline government usa cyberwar facebook social twitter military
b FBI Seeks To Monitor Facebook, Oversee Mass Social Media Data Collection By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:16 GMT Full Article headline government privacy usa facebook social twitter fbi
b New Algorithms Aim To Stamp Out Abuse On Twitter By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:03 GMT Full Article headline fraud twitter
b Facebook And Twitter Profiles Silently Slurped By Shady Code By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:06 GMT Full Article headline privacy malware phone data loss fraud facebook social twitter
b Federal Data Privacy Bill Takes Aim At Tech Giants By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:10 GMT Full Article headline government privacy usa facebook social twitter
b Twitter Goes After Baby Peanut, API Threat By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:25 GMT Full Article headline privacy phone data loss fraud flaw twitter
b Hackers Deface Facebook's Official Twitter And Instagram Accounts By packetstormsecurity.com Published On :: Sun, 09 Feb 2020 16:25:27 GMT Full Article headline hacker facebook social twitter
b Windows Mobile 6.5 MessageBox Shellcode By packetstormsecurity.com Published On :: Tue, 28 Sep 2010 01:53:25 GMT Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM. Full Article
b Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow By packetstormsecurity.com Published On :: Fri, 14 May 2010 14:44:02 GMT This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista. Full Article
b NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability By packetstormsecurity.com Published On :: Fri, 02 Jul 2010 01:05:02 GMT Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability. Full Article
b Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
b DVD X Player 5.5 .plf PlayList Buffer Overflow By packetstormsecurity.com Published On :: Fri, 02 Sep 2011 15:22:44 GMT This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7. Full Article
b CCMPlayer 1.5 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sat, 03 Dec 2011 18:32:22 GMT This Metasploit module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening a m3u playlist with a long track name, a SEH exception record can be overwritten with parts of the controllable buffer. SEH execution is triggered after an invalid read of an injectable address, thus allowing arbitrary code execution. This Metasploit module works on multiple Windows platforms including: Windows XP SP3, Windows Vista, and Windows 7. Full Article
b Quest InTrust Annotation Objects Uninitialized Pointer By packetstormsecurity.com Published On :: Fri, 13 Apr 2012 22:12:21 GMT This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser. Full Article
b NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
b Meterpreter Swaparoo Windows Backdoor Method By packetstormsecurity.com Published On :: Mon, 20 May 2013 20:50:36 GMT Swaparoo - Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen. Full Article
b MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
b SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 06 Mar 2014 03:15:49 GMT This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN). Full Article
b BDA MPEG2 Transport Information Filter DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:55:55 GMT A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
b Hacker Selling Data Of 538 Million Weibo Users By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:53 GMT Full Article headline hacker china cybercrime data loss fraud
b GE Employees Lit Up With Sensitive Doc Breach By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:39:12 GMT Full Article headline privacy data loss
b 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss
b Ransomware Scumbags Release Confidential Docs By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:02 GMT Full Article headline hacker malware data loss
b Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
b Small Businesses Tapping COVID-19 Loans Hit With Data Exposure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:07 GMT Full Article headline government privacy usa virus data loss
b Investors Sue LabCorp Over Security Failures In Light Of Data Breach By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:46 GMT Full Article headline hacker privacy virus data loss
b Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
b Google Android RCE Bug Allows Attacker Full Device Access By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:04 GMT Full Article headline privacy phone data loss flaw google