do Microsoft Windows Internet Settings Security Feature Bypass By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:50:38 GMT Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. Full Article
do Microsoft Windows 7 (x86) BlueKeep RDP Use-After-Free By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:05:11 GMT Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit. Full Article
do Microsoft Windows 7 Screen Lock Shellcode By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:02:06 GMT 9 bytes small Microsoft Windows 7 screen locking shellcode. Full Article
do Webmin 1.920 password_change.cgi Backdoor By packetstormsecurity.com Published On :: Fri, 23 Aug 2019 20:09:56 GMT This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled. Full Article
do What Would Happen If The Whole Internet Just Shutdown All Of A Sudden? By packetstormsecurity.com Published On :: Mon, 19 Aug 2019 15:06:10 GMT Full Article headline data loss terror
do FBI Arrests Man Suspected Of Dozens Of Swatting Calls By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:43 GMT Full Article headline fraud terror fbi
do FBI Possibly Backdoored OpenBSD IPSEC Stack By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 16:36:40 GMT Full Article headline fbi backdoor openbsd
do Dokeos 1.8.6.1 / 1.8.6.3 Arbitrary File Upload By packetstormsecurity.com Published On :: Sat, 21 Sep 2019 18:09:40 GMT Dokeos versions 1.8.6.1 and 1.8.6.3 suffer from a remote file upload vulnerability via an fckeditor. Full Article
do Samsung Galaxy Is Backdoored? By packetstormsecurity.com Published On :: Thu, 13 Mar 2014 07:09:40 GMT Full Article headline phone flaw backdoor samsung
do Kaspersky Identifies APT Mentioned In 2017 Shadow Brokers Leak By packetstormsecurity.com Published On :: Tue, 05 Nov 2019 15:11:59 GMT Full Article headline hacker government malware usa russia cyberwar nsa
do The NSA Has Discovered A Major Flaw In Windows 10 By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:03:48 GMT Full Article headline government microsoft usa flaw zero day nsa
do Critical Windows Vuln Used To Rickroll The NSA And Github By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:30 GMT Full Article headline privacy microsoft flaw nsa cryptography
do Microsoft Windows NtUserMNDragOver Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:05:13 GMT This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008. Full Article
do 4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:03 GMT Full Article headline government privacy usa data loss fraud identity theft
do New Class Of SQLite Exploits Open Door To iPhone Hack By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:40 GMT Full Article headline phone database flaw apple conference
do Backdoor Found In Utility For Linux, Unix Servers By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:35 GMT Full Article headline hacker flaw backdoor conference
do The Doghouse: Crown Sterling By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 15:32:44 GMT Full Article headline fraud conference cryptography
do Vendors Ditching RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:53 GMT Full Article headline usa virus china conference rsa
do Pandora FMS 7.0NG Remote Code Execution By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:17:41 GMT Pandora FMS version 7.0NG suffers from a net_tools.php remote code execution vulnerability. Full Article
do Pandora FMS Ping Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:57:47 GMT This Metasploit module exploits a vulnerability found in Pandora FMS 7.0NG and lower. net_tools.php in Pandora FMS 7.0NG allows remote attackers to execute arbitrary OS commands. Full Article
do Senate Cracks Down On Net Gambling By packetstormsecurity.com Published On :: Mon, 02 Oct 2006 09:13:16 GMT Full Article government gamble
do U.S. Skirts One Roadblock To Kim Dotcom Extradition By packetstormsecurity.com Published On :: Fri, 01 Mar 2013 15:27:17 GMT Full Article headline government usa riaa mpaa pirate new zealand
do Kim Dotcom Releases A Video Of Megaupload Raid By packetstormsecurity.com Published On :: Thu, 13 Jun 2013 15:10:12 GMT Full Article headline government usa riaa mpaa pirate new zealand
do Israeli Police Arrest Hacker Who Leaked Madonna's Music By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:47 GMT Full Article headline hacker data loss israel riaa
do Kim Dotcom Plans 2017 Relaunch Of Megaupload By packetstormsecurity.com Published On :: Mon, 11 Jul 2016 14:04:42 GMT Full Article headline riaa mpaa
do minix-dos.txt By packetstormsecurity.com Published On :: Wed, 23 Jul 2008 22:47:56 GMT Minix version 3.1.2a suffers from a tty panic local denial of service vulnerability. Full Article
do Win32/XP SP3 Windows Magnifier Shellcode By packetstormsecurity.com Published On :: Mon, 02 May 2011 23:43:16 GMT 52 bytes small Win32/XP SP3 windows magnifier shellcode. Full Article
do Win32/XP SP3 Shutdown Shellcode By packetstormsecurity.com Published On :: Mon, 02 May 2011 23:45:23 GMT 56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer. Full Article
do ptrace Sudo Token Privilege Escalation By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:07:57 GMT This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64). Full Article
do DotNetNuke CMS 9.5.0 File Extension Check Bypass By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:09:45 GMT DotNetNuke CMS version 9.5.0 suffers from file extension check bypass vulnerability that allows for arbitrary file upload. Full Article
do Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
do Netis E1+ 1.2.32533 Hardcoded Backdoor Account By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:37:10 GMT Netis E1+ version 1.2.32533 suffers from having a hardcoded backdoor root account. Full Article
do netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
do WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
do Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses By packetstormsecurity.com Published On :: Wed, 15 Aug 2018 14:35:56 GMT Full Article headline flaw cryptography intel
do Silent Windows Update Patched Side Channel That Leaked Data From Intel CPUs By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 15:21:10 GMT Full Article headline microsoft data loss flaw intel
do Kim Dotcom Mansion Raid Ruled Legal By packetstormsecurity.com Published On :: Wed, 19 Feb 2014 16:15:04 GMT Full Article headline government usa riaa mpaa pirate new zealand
do The Pirate Bay Raided By Police, Site Down By packetstormsecurity.com Published On :: Wed, 10 Dec 2014 00:17:41 GMT Full Article headline government riaa mpaa pirate sweden
do Kim Dotcom Can Be Extradited, New Zealand High Court Rules By packetstormsecurity.com Published On :: Mon, 20 Feb 2017 15:32:00 GMT Full Article headline government usa fraud riaa mpaa pirate new zealand
do WordPress Dosimple Theme 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:52:13 GMT WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability. Full Article
do Spying And Net Neutrality Dominate Debates In Brazil By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 13:55:02 GMT Full Article headline government cyberwar spyware brazil
do Most Brazilians Believe Companies Don't Protect Their Data By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:54 GMT Full Article headline privacy data loss brazil
do Brazil Prosecutes Greenwald In Attack On Press Freedom By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:40 GMT Full Article headline government data loss brazil
do New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
do NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download By packetstormsecurity.com Published On :: Tue, 23 Jan 2018 04:51:52 GMT NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user. Full Article
do Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19 By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:05 GMT Full Article headline government usa virus
do Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
do Trump Admin Threatens To Sue States That Don't Lift Orders By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:39 GMT Full Article headline government usa virus
do Windows User Accounts Penetration Testing By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 16:58:45 GMT Whitepaper called Windows User Accounts Penetration Testing. Written in Persian. Full Article
do From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article