cr Easy Transfer 1.7 Cross Site Scripting / Directory Traversal By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:52:49 GMT Easy Transfer version 1.7 for iOS suffers from cross site scripting and directory traversal vulnerabilities. Full Article
cr ChemInv 1 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:52:47 GMT ChemInv version 1 suffers from a persistent cross site scripting vulnerability. Full Article
cr Online Scheduling System 1.0 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 19:22:22 GMT Online Scheduling System version 1.0 suffers from a persistent cross site scripting vulnerability. Full Article
cr PHP-Fusion 9.03.50 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 23:03:33 GMT PHP-Fusion version 9.03.50 suffers from a persistent cross site scripting vulnerability. Full Article
cr osTicket 1.14.1 Cross Site Scripting By packetstormsecurity.com Published On :: Sun, 03 May 2020 18:22:11 GMT osTicket version 1.14.1 suffers from a persistent cross site scripting vulnerability. Full Article
cr WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:51:15 GMT WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability. Full Article
cr Online Clothing Store 1.0 Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:53:08 GMT Online Clothing Store version 1.0 suffers from a persistent cross site scripting vulnerability. Full Article
cr Sentrifugo CMS 3.2 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:19:23 GMT Sentrifugo CMS version 3.2 suffers from a persistent cross site scripting vulnerability. Full Article
cr iChat 1.6 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:21:46 GMT iChat version 1.6 suffers from a cross site scripting vulnerability. Full Article
cr OpenZ ERP 3.6.60 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:25:10 GMT OpenZ ERP version 3.6.60 suffers from a persistent cross site scripting vulnerability. Full Article
cr Draytek VigorAP Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:32:09 GMT Draytek VigorAP suffers from a persistent cross site scripting vulnerability. Multiple different versions are affected. Full Article
cr Tiny MySQL Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:44:36 GMT Tiny MySQL suffers from a cross site scripting vulnerability. Full Article
cr WebTareas 2.0p8 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:48:57 GMT WebTareas version 2.0p8 suffers from a cross site scripting vulnerability. Full Article
cr WordPress Dosimple Theme 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:52:13 GMT WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability. Full Article
cr Cisco IP Phone Harbors Critical RCE Flaw By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:48 GMT Full Article headline privacy phone flaw cisco
cr New iOS Text Bomb Bug Can Crash Your iPhone By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:04 GMT Full Article headline phone flaw apple
cr Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
cr 100,000 Home Routers Recruited To Spread Brazilian Hacking Scam By packetstormsecurity.com Published On :: Tue, 02 Oct 2018 14:13:41 GMT Full Article headline hacker malware fraud brazil
cr Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
cr Phrack - Viewer Discretion Advised - (De)coding An iOS Kernel Vulnerability By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 12:22:22 GMT Phrack Viewer Discretion Advised write up called (De)coding an iOS Kernel Vulnerability. Full Article
cr CHIYU BF430 TCP IP Converter Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:44:17 GMT CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability. Full Article
cr Yes, You Can Remotely Hack Factory, Building Site Cranes. Wait, What? By packetstormsecurity.com Published On :: Wed, 16 Jan 2019 13:35:32 GMT Full Article headline hacker flaw scada
cr New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
cr Aastra IP Telephone Crypto Failure By packetstormsecurity.com Published On :: Fri, 04 Jan 2013 01:43:44 GMT The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up. Full Article
cr Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
cr Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Sat, 06 Mar 2010 15:42:52 GMT Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected. Full Article
cr Juniper SRX Critical Denial Of Service By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 23:28:06 GMT The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions. Full Article
cr Juniper SSL VPN Bypass / Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 09 Nov 2010 01:05:48 GMT This is a list of older cross site scripting and bypass vulnerabilities associated with older Juniper IVE releases. Full Article
cr Juniper Secure Access Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 23 Jul 2013 14:44:44 GMT Juniper Secure Access software suffers from a reflective cross site scripting vulnerability. Full Article
cr Juniper JunOS 9.x Cross Site Scripting By packetstormsecurity.com Published On :: Wed, 24 Jul 2013 17:01:11 GMT Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks. Full Article
cr Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
cr Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:47 GMT Full Article headline government usa virus
cr Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
cr From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
cr Blind CreateRemoteThread Privilege Escalation By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:21:40 GMT Whitepaper called Blind CreateRemoteThread Privilege Escalation. Full Article
cr Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 00:55:43 GMT This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
cr Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
cr Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access By packetstormsecurity.com Published On :: Tue, 26 Nov 2013 01:52:43 GMT This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures. Full Article
cr Microsoft Windows Firewall Disabling Shellcode By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 23:02:22 GMT 644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service. Full Article
cr Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
cr Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
cr Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
cr Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:22:57 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability. Full Article
cr Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:24:41 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability. Full Article
cr Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
cr Ivanti Workspace Control Registry Stored Credentials By packetstormsecurity.com Published On :: Mon, 01 Oct 2018 17:33:45 GMT A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0. Full Article
cr Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
cr Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
cr Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
cr Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article