va Would-Be Hacker Vandalizes Vietnam Memorial Site By packetstormsecurity.com Published On :: Thu, 20 Sep 2007 12:17:01 GMT Full Article hacker vietnam
va EnumJavaLibs Java Classpath Enumerator By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:20:32 GMT EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization. Full Article
va Facebook's New Privacy Tool Lets You Manage How You're Tracked By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:48 GMT Full Article headline privacy facebook social
va Latest Java Zero-Day Linked To Bit9 Compromise By packetstormsecurity.com Published On :: Sat, 02 Mar 2013 23:25:27 GMT Full Article headline hacker flaw symantec java
va Venmo Transaction Scraped In Privacy Warning To Consumers By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:58 GMT Full Article headline privacy bank cybercrime data loss fraud flaw paypal
va HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
va Pensacola Hit With Cyber Attack Hours After Shooting At Naval Base By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 14:57:35 GMT Full Article headline government usa terror
va Without Encryption We Will Lose All Privacy. This Is Our New Battleground. By packetstormsecurity.com Published On :: Tue, 15 Oct 2019 13:49:15 GMT Full Article headline government privacy usa spyware nsa cryptography
va Mandriva Linux Security Advisory 2007.226 By packetstormsecurity.com Published On :: Mon, 26 Nov 2007 22:26:07 GMT Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set. Full Article
va Mandriva Linux Security Advisory 2007.232 By packetstormsecurity.com Published On :: Thu, 29 Nov 2007 01:19:35 GMT Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set. Full Article
va Ivanti Workspace Manager Security Bypass By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:54:31 GMT Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability. Full Article
va Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
va Intel's Latest Spoiler: A Spectre-Style Hardware Exploit That Leaks Private Data By packetstormsecurity.com Published On :: Thu, 07 Mar 2019 02:07:16 GMT Full Article headline privacy data loss flaw intel
va WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:51:15 GMT WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability. Full Article
va NSO Group Employees Sue Facebook For Blocking Private Accounts By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:33:31 GMT Full Article headline fraud cyberwar israel spyware facebook social
va Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
va Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
va Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray() By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:34:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 03:12:44 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
va Java storeImageArray() Invalid Array Indexing By packetstormsecurity.com Published On :: Fri, 16 Aug 2013 23:52:40 GMT This Metasploit module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the Java Sandbox. The vulnerability affects Java version 7u21 and earlier. The module, which doesn't bypass click2play, has been tested successfully on Java 7u21 on Windows and Linux systems. This was created based upon the Packet Storm Bug Bounty release for this issue. Full Article
va Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify() By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:33:00 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
va Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
va Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
va Druva inSync Windows Client 6.5.2 Privilege Escalation By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:00:54 GMT Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability. Full Article
va Ivanti Workspace Control Registry Stored Credentials By packetstormsecurity.com Published On :: Mon, 01 Oct 2018 17:33:45 GMT A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0. Full Article
va Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:40:45 GMT Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit. Full Article
va Mandriva Linux Security Advisory 2013-271 By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 19:33:57 GMT Mandriva Linux Security Advisory 2013-271 - The make include files in NetBSD before 1.6.2, as used in pmake 1.111 and earlier, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to bsd.lib.mk and bsd.prog.mk. Full Article
va LabVantage 8.3 Information Disclosure By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:27:30 GMT LabVantage version 8.3 suffers from an information disclosure vulnerability. Full Article
va Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
va Shifty New Variant Of Qbot Banking Trojan Spreads By packetstormsecurity.com Published On :: Fri, 01 Mar 2019 00:17:09 GMT Full Article headline malware bank trojan
va TrickBot Switches To A New Win10 UAC Bypass To Evade Detection By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 15:59:32 GMT Full Article headline malware microsoft trojan fraud flaw
va Officials Say State-Backed Hackers Taking Advantage Of Outbreak By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:33:43 GMT Full Article headline government malware virus cyberwar
va Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
va Google Steps Up Browser Rivalry With Site Isolation Security By packetstormsecurity.com Published On :: Thu, 07 Dec 2017 14:24:14 GMT Full Article headline google chrome
va Chinese Man Jailed Over Using VPNs To Evade State Blocks By packetstormsecurity.com Published On :: Tue, 05 Sep 2017 13:07:57 GMT Full Article headline government privacy china cryptography censorship
va Major European Private Hospital Operator Struck By Ransomware By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:51 GMT Full Article headline malware cryptography
va Federal Data Privacy Bill Takes Aim At Tech Giants By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:10 GMT Full Article headline government privacy usa facebook social twitter
va Mandriva Linux Security Advisory 2012-081 By packetstormsecurity.com Published On :: Thu, 24 May 2012 15:20:53 GMT Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed. Full Article
va GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
va Valve Confirms CS:GO, Team Fortress 2 Source Code Leak By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:19 GMT Full Article headline hacker data loss
va Hacker Gains Access To Some Private Microsoft GitHub Repos By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:12 GMT Full Article headline hacker microsoft data loss
va NetBSD-SA1999-012.vax.ptrace By packetstormsecurity.com Published On :: Thu, 23 Sep 1999 04:08:42 GMT NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here. Full Article
va vaxhack.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT How to hack VAX's. Full Article