so Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
so Microsoft Windows Unquoted Service Path Privilege Escalation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 20:01:59 GMT This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem. Full Article
so Microsoft Twitter Accounts Hit Again By Syrian Electronic Army By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:33:03 GMT Full Article headline hacker microsoft twitter syria
so Microsoft In More Hacking Misery By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:20 GMT Full Article headline hacker microsoft flaw syria
so France Fingered As Source Of Syria-Spying Babar Malware By packetstormsecurity.com Published On :: Fri, 06 Mar 2015 14:25:28 GMT Full Article headline government privacy malware spyware france syria
so Patriotic Hackers Face Off In South China Sea By packetstormsecurity.com Published On :: Fri, 27 Apr 2012 14:46:33 GMT Full Article headline china cyberwar philippines
so Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
so Microsoft And Mozilla Ban Dutch Government Root Certificate By packetstormsecurity.com Published On :: Wed, 07 Sep 2011 14:37:21 GMT Full Article headline microsoft ssl mozilla netherlands
so Nork Hackers Exploit Flash Bug To Pwn South Koreans By packetstormsecurity.com Published On :: Fri, 02 Feb 2018 16:17:34 GMT Full Article headline flaw cyberwar adobe korea
so Microsoft Culls Secret Flash Whitelist After Google Points Out Its Insecurity By packetstormsecurity.com Published On :: Thu, 21 Feb 2019 16:47:46 GMT Full Article headline malware microsoft google adobe
so Microsoft To Employ California's Digital Privacy Law Nationwide By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:20 GMT Full Article headline privacy microsoft usa
so Microsoft Taps Eric Holder To Audit AnyVision Face Recognition By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:35:09 GMT Full Article headline microsoft fraud
so Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 16:44:06 GMT Full Article headline microsoft flaw patch
so Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:06 GMT Full Article headline hacker microsoft
so Microsoft Zero Day Actively Exploited, Patch Forthcoming By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:44:50 GMT Full Article headline hacker microsoft flaw patch zero day
so Microsoft Takes Down Global Zombie Bot Network By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:19 GMT Full Article headline microsoft botnet
so Microsoft Warns Of Windows Zero-Day Exploited In The Wild By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:21 GMT Full Article headline microsoft flaw zero day
so Over 350,000 Microsoft Exchange Servers Still Open To Flaw By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:12 GMT Full Article headline microsoft flaw patch
so Microsoft Teams Could Be Pwned With A Gif By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:07 GMT Full Article headline microsoft flaw
so Read Tim Morrison's NSC Impeachment Testimony By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:01:48 GMT Full Article headline government usa russia fraud
so Sophisticated Spy Kit Targets Russians With Rare GSM Plugin By packetstormsecurity.com Published On :: Fri, 11 Oct 2019 14:57:10 GMT Full Article headline malware phone russia cyberwar spyware backdoor
so IBM Open Sources New Approach To Crypto By packetstormsecurity.com Published On :: Fri, 03 May 2013 14:50:23 GMT Full Article headline ibm cryptography
so FBI Sought Interpol Statement Against End To End Crypto By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:01:35 GMT Full Article headline government privacy usa spyware fbi cryptography
so Microsoft-Vietnam Cement Anti-Piracy Deal By packetstormsecurity.com Published On :: Mon, 21 May 2007 19:52:16 GMT Full Article microsoft vietnam
so Vietnam - Where Pirated Apps Match Personal Budgets By packetstormsecurity.com Published On :: Wed, 17 Dec 2008 19:29:57 GMT Full Article vietnam
so US Slams Vietnam Censorship Despite PRISM Hypocrisy By packetstormsecurity.com Published On :: Tue, 06 Aug 2013 14:48:23 GMT Full Article headline government privacy usa vietnam nsa censorship
so Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
so Mozilla Just Doubled Its Payouts As It Tries To Attract Software Vulnerability Hunters By packetstormsecurity.com Published On :: Wed, 20 Nov 2019 15:01:32 GMT Full Article headline hacker flaw mozilla firefox
so i-doit Open Source CMDB 1.14.1 Arbitrary File Deletion By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:33:53 GMT i-doit Open Source CMDB version 1.14.1 suffers from an arbitrary file deletion vulnerability. Full Article
so Quantum Processor's Prime Feat Raises Security Issues By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 04:41:13 GMT Full Article headline flaw science rsa
so McAfee Buys Stonesoft Security For $389m By packetstormsecurity.com Published On :: Tue, 07 May 2013 14:31:04 GMT Full Article headline mcafee
so Microsoft / McAfee Move To Gut Superfish From Lenovo Laptops By packetstormsecurity.com Published On :: Mon, 23 Feb 2015 15:28:43 GMT Full Article headline malware microsoft china mcafee backdoor cryptography
so McAfee Claims Ashley Madison Hack Could Destabilize Society By packetstormsecurity.com Published On :: Fri, 24 Jul 2015 14:24:46 GMT Full Article headline hacker privacy data loss mcafee
so Someone Tried To Off John McAfee? By packetstormsecurity.com Published On :: Mon, 24 Jul 2017 13:59:58 GMT Full Article headline mcafee
so Linux/x86 execve(/bin/sh) Socket Reuse Shellcode By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:18:16 GMT 42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode. Full Article
so FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
so Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
so Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
so Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
so Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
so Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
so Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
so Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
so Virgin Media Learns About Poor Outsourcing Decisions By packetstormsecurity.com Published On :: Fri, 04 Mar 2016 16:02:25 GMT Full Article headline india flaw cryptography
so Romanian CCTV Ransomware Culprit Admits Guilt By packetstormsecurity.com Published On :: Fri, 21 Sep 2018 15:12:38 GMT Full Article headline government malware usa fraud romania
so ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling By packetstormsecurity.com Published On :: Thu, 11 Dec 2014 22:27:12 GMT ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected. Full Article
so Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
so Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
so Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
so Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article