y Google Finds Malicious Sites Pushing iOS Exploits For Years By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 14:34:02 GMT Full Article headline privacy malware phone flaw google spyware apple zero day
y Zero-Day Privilege Escalation Disclosed For Android By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:45 GMT Full Article headline phone flaw google zero day
y Apple, Angry At Google, Hits Back At Hack Claims By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:28 GMT Full Article headline privacy malware phone flaw google apple zero day
y vBulletin Zero Day KOs Comodo User Forums By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 14:55:17 GMT Full Article headline hacker privacy data loss flaw password zero day
y Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:26 GMT Full Article headline hacker government data loss cyberwar zero day
y NYPD Arrests Ninth Methbot Gang Member By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:45 GMT Full Article headline malware usa cybercrime fraud
y Ashley Madison Breach Extortion Scam Targets Hundreds By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:23 GMT Full Article headline hacker privacy cybercrime data loss fraud
y DoppelPaymer Ransomware Steals SpaceX/Tesla Supplier Data By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:12 GMT Full Article headline hacker malware cybercrime data loss fraud
y Adobe Flash Player Type Confusion Remote Code Execution By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 02:01:15 GMT This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1. Full Article
y Adobe Flash Player Integer Underflow Remote Code Execution By packetstormsecurity.com Published On :: Mon, 05 May 2014 19:05:06 GMT This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild. Full Article
y X360 VideoPlayer ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Tue, 17 Feb 2015 18:25:40 GMT This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code. Full Article
y Tango DropBox 3.1.5 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:39:30 GMT Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO. Full Article
y Tango FTP 1.0 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:41:56 GMT Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136. Full Article
y Kguard Digital Video Recorder Bypass Issues By packetstormsecurity.com Published On :: Wed, 24 Jun 2015 17:55:55 GMT A deficiency in handling authentication and authorization has been found with Kguard 104/108/v2 models. While password-based authentication is used by the ActiveX component to protect the login page, all the communication to the application server at port 9000 allows data to be communicated directly with insufficient or improper authorization. Proof of concept exploit included. Full Article
y Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Sun, 05 Nov 2017 15:40:54 GMT Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability. Full Article
y G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 16:14:16 GMT G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability. Full Article
y Ubuntu Security Notice USN-4058-1 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:09:46 GMT Ubuntu Security Notice 4058-1 - It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Full Article
y Ubuntu Security Notice USN-4058-2 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:47:57 GMT Ubuntu Security Notice 4058-2 - USN-4058-1 fixed a vulnerability in bash. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Various other issues were also addressed. Full Article
y Ubuntu Security Notice USN-4180-1 By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:38:23 GMT Ubuntu Security Notice 4180-1 - It was discovered that Bash incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Full Article
y Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
y Product Key Explorer 4.2.2.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 17:22:22 GMT Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit. Full Article
y Facebook Suspends Tens Of Thousands Of Apps Over Privacy Issues By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:52:46 GMT Full Article headline privacy facebook social
y AG Barr Asks Facebook To Not Use End To End Encryption By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:34 GMT Full Article headline government privacy usa spyware facebook social cryptography
y Cozy Bear Is Back In Action Again By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:50 GMT Full Article headline government usa russia fraud cyberwar facebook social
y Two Plead Guilty In Conspiracy Involving Uber, LinkedIn, Others By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 14:20:28 GMT Full Article headline hacker privacy cybercrime data loss fraud social uber
y System Bug Gives Facebook Access To iPhone Cameras By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:40 GMT Full Article headline privacy phone flaw apple facebook social
y Amnesty Slams Facebook, Google Over Business Models By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:02:04 GMT Full Article headline privacy data loss google spyware facebook social
y Facebook Alleges Company Infiltrated Thousands For Ad Fraud By packetstormsecurity.com Published On :: Fri, 06 Dec 2019 16:13:45 GMT Full Article headline cybercrime fraud facebook social
y 15 Anonymous Suspects Arrested By Italian And Swiss Police By packetstormsecurity.com Published On :: Wed, 06 Jul 2011 14:27:49 GMT Full Article headline hacker italy anonymous switzerland
y Truecrypt Is Alive And Well And Living In Switzerland By packetstormsecurity.com Published On :: Tue, 03 Jun 2014 01:48:34 GMT Full Article headline privacy cryptography switzerland
y MIT And CERN's Secure Webmail Plan Stumped By PayPal Freeze By packetstormsecurity.com Published On :: Tue, 01 Jul 2014 06:38:49 GMT Full Article headline email bank cybercrime fraud paypal switzerland
y Snowden Shouldn't Be Extradited To US If He Testifies About NSA Spying, Says Swiss Gov By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:14 GMT Full Article headline government usa cyberwar spyware switzerland
y Encrypted Email Service ProtonMail Opens Door For Tor Users By packetstormsecurity.com Published On :: Thu, 19 Jan 2017 13:55:21 GMT Full Article headline government privacy email spyware cryptography switzerland
y Kaspersky Lab To Shift US Customer Data From Russia To Switzerland By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:10 GMT Full Article headline privacy usa virus russia switzerland
y Secunia Security Advisory 17850 By packetstormsecurity.com Published On :: Fri, 02 Dec 2005 16:21:50 GMT Secunia Security Advisory - r0t has reported a vulnerability in QualityEBiz Quality PPC (QualityPPC), which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
y VLCMediaSlayer-ppc.pl.txt By packetstormsecurity.com Published On :: Thu, 04 Jan 2007 08:15:37 GMT Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc. Full Article
y Inout PPC Engine Cross Site Request Forgery By packetstormsecurity.com Published On :: Sun, 11 Mar 2012 15:22:22 GMT Inout PPC Engine suffers from a cross site request forgery vulnerability. Full Article
y Secunia Security Advisory 48336 By packetstormsecurity.com Published On :: Mon, 12 Mar 2012 10:10:02 GMT Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Article
y Were Oslo's Terror Blasts Caused By Car Bombs? By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:16:02 GMT Full Article headline terror norway
y Twin Terror Attacks Shock Norway By packetstormsecurity.com Published On :: Sat, 23 Jul 2011 01:58:41 GMT Full Article headline terror norway
y Police Say Oslo Suspect Admits To 'Facts' In Massacre By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:52:52 GMT Full Article headline terror norway
y Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
y Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack By packetstormsecurity.com Published On :: Fri, 18 Nov 2011 16:43:19 GMT Full Article headline cyberwar norway
y Soca Website Attack: Norway Arrests Two Youths By packetstormsecurity.com Published On :: Wed, 09 May 2012 15:58:55 GMT Full Article headline hacker denial of service mpaa norway
y E-Voting Experiments Ends In Norway Amid Security Fears By packetstormsecurity.com Published On :: Sun, 29 Jun 2014 16:46:22 GMT Full Article headline government flaw norway
y Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
y Major Fraud Scheme Exposed By Insecure Database By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:30 GMT Full Article headline database cybercrime fraud
y 198M Records Of Prospective Auto Buyers Leaked By packetstormsecurity.com Published On :: Mon, 16 Sep 2019 14:36:04 GMT Full Article headline privacy database data loss
y Leaky Autoclerk Database Exposes Info On Travelers By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 16:39:14 GMT Full Article headline government privacy database data loss spyware military
y Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article