ut First Irish-Speaking Virus Holds Bloke's Computer To Ransom By packetstormsecurity.com Published On :: Sat, 08 Sep 2012 00:36:18 GMT Full Article headline malware virus cybercrime fraud ireland
ut Chap Cuffed After Treating Commuters To Giant-Screen Smut By packetstormsecurity.com Published On :: Thu, 06 Oct 2016 14:05:33 GMT Full Article headline hacker indonesia
ut Mandos Encrypted File System Unattended Reboot Utility 1.8.11 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:12 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
ut Google Pays $65k To Shutter 23 Chrome Bugs By packetstormsecurity.com Published On :: Mon, 30 May 2016 16:57:54 GMT Full Article headline flaw google chrome
ut Google Chrome 75 Rolls Out With 42 Security Fixes By packetstormsecurity.com Published On :: Thu, 06 Jun 2019 13:23:13 GMT Full Article headline flaw google patch chrome
ut Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
ut Vladimir Putin Signs Sweeping Internet Censorship Bills By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 14:17:50 GMT Full Article headline government russia censorship
ut Putin Signs Internet Sovereignty Bill That Expands Censorship By packetstormsecurity.com Published On :: Fri, 03 May 2019 14:11:56 GMT Full Article headline government russia censorship
ut The White House Readies Draft Of Executive Order That Could Break The Internet By packetstormsecurity.com Published On :: Sat, 10 Aug 2019 16:23:17 GMT Full Article headline government usa facebook social censorship
ut Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
ut SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
ut Samsung Android Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:12:41 GMT Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia. Full Article
ut New Algorithms Aim To Stamp Out Abuse On Twitter By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:03 GMT Full Article headline fraud twitter
ut Authorities Make Arrest Of Alleged Hacker That Hacked Jack Dorsey By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:33:34 GMT Full Article headline hacker phone twitter
ut Twitter Goes After Baby Peanut, API Threat By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:25 GMT Full Article headline privacy phone data loss fraud flaw twitter
ut Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
ut Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
ut HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
ut MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
ut MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ut MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
ut HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
ut Thousands Of Turkish Twitter OAuth Tokens Leaked By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 15:10:32 GMT Full Article headline hacker data loss flaw turkey social twitter
ut Turkey Blocks Twitter But Users Find Workarounds By packetstormsecurity.com Published On :: Fri, 21 Mar 2014 15:15:06 GMT Full Article headline government turkey twitter censorship
ut Turkey Blocks Twitter, YouTube Over Hostage Photos By packetstormsecurity.com Published On :: Mon, 06 Apr 2015 14:25:37 GMT Full Article headline cyberwar turkey twitter censorship
ut Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
ut US Is Out Of The Picture In Syria-Turkey Crisis. Putin Now Owns This Mess. By packetstormsecurity.com Published On :: Sun, 20 Oct 2019 15:56:43 GMT Full Article headline government usa russia turkey syria military
ut VB-98.07.OpenVMS.LOGINOUT By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:51:46 GMT A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered. Full Article
ut psibrute.com.txt By packetstormsecurity.com Published On :: Sun, 17 Nov 2002 03:04:53 GMT This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users. Full Article
ut Android Trojan Switcher Infects Routers Via DNS Hijacking By packetstormsecurity.com Published On :: Fri, 30 Dec 2016 15:26:15 GMT Full Article headline malware phone dns google
ut DNS Requests Are Routinely Spied On By packetstormsecurity.com Published On :: Mon, 20 Aug 2018 15:50:44 GMT Full Article headline privacy dns spyware
ut DNSpionage Actors Adjust Tactics, Debut New RAT By packetstormsecurity.com Published On :: Thu, 25 Apr 2019 15:52:44 GMT Full Article headline hacker government dns fraud cyberwar
ut Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
ut New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:39:20 GMT Full Article headline hacker malware dns
ut Rootstealer X11 Code Executor By packetstormsecurity.com Published On :: Sat, 10 Mar 2018 20:22:22 GMT Rootstealer is a program to detect when a linux user opens a terminal with root and it injects intrusive commands in the terminal with X11. Full Article
ut Pisay Online E-Learning System 1.0 SQL Injection / Code Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:34 GMT Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities. Full Article
ut MySQL G0ld Brute Forcing Utility By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 12:12:12 GMT MySQL G0ld is a program that issues brute force attacks against a MySQL Server using a supplied wordlist. Full Article
ut Brutus FTP Attack Tool 0.3 By packetstormsecurity.com Published On :: Thu, 07 Sep 2017 01:01:01 GMT Brutus is a small threaded python FTP brute-force and dictionary attack tool. It supports several brute-force parameters such as a custom character sets, password length, minimum password length, prefix, and postfix strings to passwords generated. Full Article
ut XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer By packetstormsecurity.com Published On :: Sun, 24 Dec 2017 00:33:33 GMT XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script. Full Article
ut Ecommerce Systempay 1.0 Brute Force By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:44:17 GMT Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability. Full Article
ut Brain Hack Devices Must Be Scrutinized, Say Top Scientists By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:11 GMT Full Article headline hacker science
ut Hacking Brain-Computer Interfaces By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:13 GMT Full Article headline hacker science
ut Smart Thermometers Detect Large Fever Outbreak In Florida By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 15:19:33 GMT Full Article headline government usa virus science
ut Coronavirus Has Slashed Air Pollution. This Interactive Map Shows How. By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:07:37 GMT Full Article headline virus science
ut Hyperthreading Under Scrutiny With New TLBleed Crypto Key Leak By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:49:41 GMT Full Article headline flaw bsd cryptography
ut OpenBSD Patches Auth Bypass, Privilege Escalation Vulns By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:00 GMT Full Article headline flaw bsd patch
ut Alleged Computer Hacker Granted Bail By packetstormsecurity.com Published On :: Wed, 23 Sep 2009 04:58:22 GMT Full Article hacker caribbean
ut Deutsche Telekom Hack Suspect Arrested At London Airport By packetstormsecurity.com Published On :: Fri, 24 Feb 2017 15:02:16 GMT Full Article headline hacker germany
ut Codebreaking Bombe Moves To Computer Museum By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 15:50:02 GMT Full Article headline britain cyberwar germany cryptography
ut Germany Proposes Router Security Guidelines By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 15:31:28 GMT Full Article headline government germany