ow Win32/XP SP3 Shutdown Shellcode By packetstormsecurity.com Published On :: Mon, 02 May 2011 23:45:23 GMT 56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer. Full Article
ow Crown Prince Of Saudi Arabia Accused Of Hacking Jeff Bezos' Phone By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:44 GMT Full Article headline hacker government usa phone amazon flaw cyberwar facebook saudi arabia
ow Multiple Vulnerabilities in MySQL - Upgrade Now By packetstormsecurity.com Published On :: Tue, 17 Dec 2002 03:08:36 GMT Full Article database mysql
ow netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
ow WebAssembly Changes Could Ruin Meltdown And Spectre Patches By packetstormsecurity.com Published On :: Thu, 28 Jun 2018 00:30:32 GMT Full Article headline flaw patch intel
ow Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses By packetstormsecurity.com Published On :: Wed, 15 Aug 2018 14:35:56 GMT Full Article headline flaw cryptography intel
ow Silent Windows Update Patched Side Channel That Leaked Data From Intel CPUs By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 15:21:10 GMT Full Article headline microsoft data loss flaw intel
ow The Pirate Bay Raided By Police, Site Down By packetstormsecurity.com Published On :: Wed, 10 Dec 2014 00:17:41 GMT Full Article headline government riaa mpaa pirate sweden
ow Games Of Thrones Has The Most Malware Of Any Pirated TV Show By packetstormsecurity.com Published On :: Wed, 03 Apr 2019 14:01:33 GMT Full Article headline malware mpaa pirate
ow TikTok Flaw Allows Hackers To Plant Forged Videos By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:33:01 GMT Full Article headline hacker phone flaw
ow British Spooks Seize Tech From Snowden Journo's Boyfriend At Airport By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 15:00:14 GMT Full Article headline government privacy usa britain data loss brazil nsa
ow Edward Snowden Pens An Open Letter To The People Of Brazil By packetstormsecurity.com Published On :: Tue, 17 Dec 2013 16:10:05 GMT Full Article headline government usa russia spyware brazil nsa
ow World Cup Security Center Leaks Own WiFi Password By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 13:30:32 GMT Full Article headline wireless data loss brazil
ow Cartoon Network Hacked Worldwide To Show Brazilian Stripper Videos By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:39:03 GMT Full Article headline hacker brazil
ow Denial Of Service Event Impacted U.S. Power Utility Last Month By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:30 GMT Full Article headline usa denial of service cyberwar scada
ow US And Russia Clash Over Power Grid Hack Attacks By packetstormsecurity.com Published On :: Tue, 18 Jun 2019 15:59:50 GMT Full Article headline government usa russia cyberwar scada
ow NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download By packetstormsecurity.com Published On :: Tue, 23 Jan 2018 04:51:52 GMT NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user. Full Article
ow Top Infectious Disease Expert Does Not Rule Out Supporting Temporary National Lockdown To Combat COVID-19 By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 14:23:05 GMT Full Article headline government usa virus
ow Windows User Accounts Penetration Testing By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 16:58:45 GMT Whitepaper called Windows User Accounts Penetration Testing. Written in Persian. Full Article
ow Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Wed, 14 Aug 2013 02:59:49 GMT The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
ow Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 23:28:12 GMT The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
ow Triologic Media Player 8 Buffer Overflow By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 18:32:22 GMT Triologic Media Player version 8 suffers from a .m3l local buffer overflow vulnerability. Full Article
ow ALLPlayer 7.6 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:12:43 GMT ALLPlayer version 7.6 unicode SEH local buffer overflow exploit. Full Article
ow Microsoft Windows Firewall Disabling Shellcode By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 23:02:22 GMT 644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service. Full Article
ow Druva inSync Windows Client 6.5.2 Privilege Escalation By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:00:54 GMT Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability. Full Article
ow Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
ow Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
ow Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
ow Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:22:57 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability. Full Article
ow Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:24:41 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability. Full Article
ow Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
ow Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
ow Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
ow Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
ow Windows UAC Protection Bypass By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 19:20:15 GMT This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. Full Article
ow Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
ow Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
ow Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:01 GMT This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. Full Article
ow Windows Escalate UAC Protection Bypass By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:34:40 GMT This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when Windows backup and restore is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked. Full Article
ow Microsoft Windows Kernel Privilege Escalation By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 23:02:22 GMT This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tracing functionality used by the Routing and Remote Access service. The issue results from the lack of proper permissions on registry keys that control this functionality. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Full Article
ow Xinfire TV Player 6.0.1.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:16:03 GMT This Metasploit module exploits a buffer overflow in Xinfire TV Player Pro and Standard version 6.0.1.2. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as Aviosoft Digital TV Player and BlazeVideo HDTV Player. Full Article
ow Xinfire DVD Player 5.5.0.0 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:17:01 GMT This Metasploit module exploits a buffer overflow in Xinfire DVD Player Pro and Standard version 5.5.0.0. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as DVD X Player and BlazeDVD. Full Article
ow ManageEngine Asset Explorer Windows Agent Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:56:17 GMT The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected. Full Article
ow Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow By packetstormsecurity.com Published On :: Wed, 13 Dec 2017 17:03:19 GMT Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). Full Article
ow Coronavirus: How Hackers Are Preying On Fears Of Covid-19 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:24 GMT Full Article headline hacker virus phish
ow Windows Scammers Threaten To Blow Up Irish Garda Station By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:20:49 GMT Full Article headline microsoft scam ireland terror
ow Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
ow Australia Sites Hacked Amid Spying Row With Indonesia By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 16:06:34 GMT Full Article headline hacker government australia spyware anonymous indonesia
ow Google Fixes 12 High-Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Sat, 03 Dec 2016 15:20:36 GMT Full Article headline flaw google patch chrome
ow Chrome On Windows Has Credential Theft Bug By packetstormsecurity.com Published On :: Wed, 17 May 2017 13:13:15 GMT Full Article headline flaw google password chrome